- Berhanu Aebissa, Gurpreet Dhillon, Million Meshesha. Information security policy compliance: a replication study in Ethiopia. Inf. Manag. Comput. Security, 33(3):408-426, 2025.
- Joakim Kävrestad, Felicia Burvall, Marcus Nohlberg. A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA). Inf. Manag. Comput. Security, 33(2):141-160, 2025.
- Michael J. Rooney, Yair Levy, Wei Li 0025, Ajoy Kumar. Comparing experts' and users' perspectives on the use of password workarounds and the risk of data breaches. Inf. Manag. Comput. Security, 33(2):196-222, 2025.
- Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Mohammad Aljawarneh, Mohammed N. Al-Refai, Mahmoud Baklizi. A collaborative cybersecurity framework for higher education. Inf. Manag. Comput. Security, 33(3):362-389, 2025.
- Cláudia Ascenção, Henrique Teixeira, João Gonçalves, Fernando Almeida. Large-scale agile security practices in software engineering. Inf. Manag. Comput. Security, 33(3):344-361, 2025.
- Khaled Alshare, Murad A. Moqbel, Maliha Alam, Moler Hanna. Health status: the pivot point in trusting smart health-care systems and providers for use. Inf. Manag. Comput. Security, 33(3):390-407, 2025.
- Martina Neri, Elisabetta Benevento, Alessandro Stefanini, Davide Aloini, Federico Niccolini, Annalaura Carducci, Ileana Federigi, Gianluca Dini. Understanding information security awareness: evidence from the public healthcare sector. Inf. Manag. Comput. Security, 33(3):309-319, 2025.
- Mari Aarland. Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework. Inf. Manag. Comput. Security, 33(1):5-24, 2025.
- Xiaoguang Tian. Unraveling the dynamics of password manager adoption: a deeper dive into critical factors. Inf. Manag. Comput. Security, 33(1):117-139, 2025.
- Marcus Gerdin. Validating and extending the unified model of information security policy compliance. Inf. Manag. Comput. Security, 33(1):25-48, 2025.