Journal: Inf. Manag. Comput. Security

Volume 22, Issue 5

410 -- 430Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian Pechstein. Current challenges in information security risk management
431 -- 449Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat, Mamoun Alazab. Using response action with intelligent intrusion detection and prevention system against web application malware
450 -- 473Sindhuja P. N.. Impact of information security initiatives on supply chain performance: An empirical investigation
474 -- 489John D'Arcy, Gwen Greene. Security culture and the employment relationship as drivers of employees' security compliance
490 -- 512Jae Choi, Derek L. Nazareth. Repairing trust in an e-commerce and security context: an agent-based modeling approach
513 -- 536Atif Ahmad, Sean B. Maynard. Teaching information security management: reflections and experiences

Volume 22, Issue 4

334 -- 345Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram. A study of information security awareness in Australian government organisations
346 -- 357Kirsi Helkala, Tone Hoddø Bakås. Extended results of Norwegian password security survey
358 -- 370John Haggerty, Sheryllynne Haggerty, Mark John Taylor. Forensic triage of email network narratives through visualisation
371 -- 381Rayne Reid, Johan Van Niekerk. Brain-compatible, web-based information security education: a statistical study
382 -- 392Maina M. Olembo, Timo Kilian, Simon Stockhardt, Andreas Hülsing, Melanie Volkamer. Developing and testing SCoP - a visual hash scheme
393 -- 406Waldo Rocha Flores, Hannes Holm, Gustav Svensson, Göran Ericsson. Using phishing experiments and scenario-based surveys to understand security behaviours in practice

Volume 22, Issue 3

194 -- 234Swapan Purkait, Sadhan Kumar De, Damodar Suar. An empirical investigation of the factors that influence Internet user's ability to correctly identify a phishing website
235 -- 250Winfred Yaokumah. Information security governance implementation within Ghanaian industry sectors: An empirical study
251 -- 264Issa Atoum, Ahmed Otoom, Amer Abu-Ali. A holistic cyber security implementation framework
265 -- 278Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo Dos Santos, Carlos Becker Westphall. A cyclical evaluation model of information security maturity
279 -- 308Mario Silic, Andrea Back. Information security: Critical review and future directions for research
309 -- 330Peter James, Don Griffiths. A secure portable execution environment to support teleworking

Volume 22, Issue 2

130 -- 133Eugene Kaspersky, Steven Furnell. A security education Q&A
134 -- 140Firman Azhari. Quick detection of NFC vulnerability: Implementation weakness exploitation
141 -- 154Dusan Repel, Ingo Stengel. Grammar-based transformations: attack and defence
155 -- 166Weizhi Meng, Duncan S. Wong, Lam-for Kwok. The effect of adaptive mechanism on behavioural biometric based mobile phone authentication
167 -- 178Iwan Gulenko. Improving passwords: influence of emotions on security behaviour
179 -- 190Rayne Reid, Johan Van Niekerk. Snakes and ladders for digital natives: information security education for the youth

Volume 22, Issue 1

2 -- 23Sanjay Bahl, O. P. Wali. Perceived significance of information security governance to predict the information security service quality in software service industry: An empirical analysis
24 -- 41Deepa Mani, Kim-Kwang Raymond Choo, Sameera Mubarak. Information security in the South Australian real estate industry: A study of 40 real estate organisations
42 -- 75Teodor Sommestad, Jonas Hallberg, Kristoffer Lundholm, Johan E. Bengtsson. Variables influencing information security policy compliance: A systematic review of quantitative studies
76 -- 96Thembekile O. Mayayise, Isaac Olusegun Osunmakinde. E-commerce assurance models and trustworthiness issues: an empirical study
97 -- 114Mark Harris, Karen P. Patten. Mobile device security considerations for small- and medium-sized enterprise business mobility
115 -- 126Eyong B. Kim. Recommendations for information security awareness training for college students