Journal: Inf. Manag. Comput. Security

Volume 30, Issue 4

473 -- 489Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong. How do non experts think about cyber attack consequences?
490 -- 516Harrison Stewart. A systematic framework to explore the determinants of information security policy development and outcomes
517 -- 548Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Rénette J. Blignaut, Angelo Cavallo. A quantification mechanism for assessing adherence to information security governance guidelines
549 -- 561Mohamad Gharib. Toward an architecture to improve privacy and informational self-determination through informed consent
562 -- 582Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios Chatzis. Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research
583 -- 614Eric Amankwa, Marianne Loock, Elmarie Kritzinger. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors
615 -- 632Suncica Hadzidedic, Silvia Berenice Fajardo Flores, Belma Ramic-Brkic. User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina
633 -- 650Marium Khalid, Mehreen Afzal, Waseem Iqbal 0001. A game model design using test bed for Malware analysis training