473 | -- | 489 | Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong. How do non experts think about cyber attack consequences? |
490 | -- | 516 | Harrison Stewart. A systematic framework to explore the determinants of information security policy development and outcomes |
517 | -- | 548 | Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Rénette J. Blignaut, Angelo Cavallo. A quantification mechanism for assessing adherence to information security governance guidelines |
549 | -- | 561 | Mohamad Gharib. Toward an architecture to improve privacy and informational self-determination through informed consent |
562 | -- | 582 | Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios Chatzis. Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research |
583 | -- | 614 | Eric Amankwa, Marianne Loock, Elmarie Kritzinger. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors |
615 | -- | 632 | Suncica Hadzidedic, Silvia Berenice Fajardo Flores, Belma Ramic-Brkic. User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina |
633 | -- | 650 | Marium Khalid, Mehreen Afzal, Waseem Iqbal 0001. A game model design using test bed for Malware analysis training |