Journal: Inf. Manag. Comput. Security

Volume 23, Issue 5

450 -- 475Himanshu Srivastava, Shashikala Tapaswi. Logical acquisition and analysis of data from android mobile devices
476 -- 496Sindhuja P. N, Anand S. Kunnathur. Information security in supply chains: a management control perspective
497 -- 515Alain Forget, Sonia Chiasson, Robert Biddle. User-centred authentication feature framework
516 -- 531Teodor Sommestad, Fredrik Sandström. An empirical test of the accuracy of an attack graph analysis tool
532 -- 569Abdulrahman Alqahtani. Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study
570 -- 583Mario Silic, Andrea Back, Dario Silic. Taxonomy of technological risks of open source software in the enterprise adoption context

Volume 23, Issue 4

370 -- 381André Lötter, Lynn Futcher. A framework to assist email users in the identification of phishing attacks
382 -- 393Thomas Hughes-Roberts. Privacy as a secondary goal problem: an experiment examining control
394 -- 405Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian Mitrou. Reengineering the user: privacy concerns about personal data on smartphones
406 -- 420Bukelwa Ngoqo, Stephen V. Flowerday. Exploring the relationship between student mobile information security awareness and behavioural intent
421 -- 434Martin Butler, Rika Butler. Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking
435 -- 446Shamal Faily. Engaging stakeholders during late stage security design with assumption personas

Volume 23, Issue 3

246 -- 285Fredrik Karlsson, Joachim Åström, Martin Karlsson. Information security culture - state-of-the-art review between 2000 and 2013
286 -- 301Ioannis Tsimperidis, Vasilios Katos, Nathan L. Clarke. Language-independent gender identification through keystroke analysis
302 -- 316Ruth Østgaard Skotnes. Management commitment and awareness creation - ICT safety and security in electric power supply network companies
317 -- 332Randy Borum, John Felker, Sean Kern, Kristen Dennesen, Tonya Feyes. Strategic cyber intelligence
333 -- 346Swapan Purkait. Examining the effectiveness of phishing filters against DNS based phishing attacks
347 -- 367Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Günes Kayacik. Investigating the work practices of network security professionals

Volume 23, Issue 2

122 -- 144Sushma Mishra. Organizational objectives for information security governance: a value focused assessment
145 -- 160Yung-Shen Yen. Managing perceived risk for customer retention in e-commerce: The role of switching costs
161 -- 177Li-Hsing Ho, Ming-Tsai Hsu, Tieh-Min Yen. Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL
178 -- 199Waldo Rocha Flores, Hannes Holm, Marcus Nohlberg, Mathias Ekstedt. Investigating personal determinants of phishing and the effect of national culture
200 -- 217Teodor Sommestad, Henrik Karlzén, Jonas Hallberg. The sufficiency of the theory of planned behavior for explaining information security policy compliance
218 -- 242Maryam Shahpasand, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, Hoda Ghavamipoor. A comprehensive security control selection model for inter-dependent organizational assets structure

Volume 23, Issue 1

0 -- 0Steven Furnell. Editorial
3 -- 19Yan Sun, Ian Davidson. Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the UK and China
20 -- 30Kent Marett. Checking the manipulation checks in information security research
31 -- 57Ahmed Ahmim, Nacira Ghoualmi-zine. A new hierarchical intrusion detection system based on a binary tree of classifiers
58 -- 72Phil Brooke, Richard Paige. User-visible cryptography in email and web scenarios
73 -- 101Eugene Ferry, John O'Raw, Kevin Curran. Security evaluation of the OAuth 2.0 framework
102 -- 118Hasan M. Al-Mukahal, Khaled A. Alshare. An examination of factors that influence the number of information security policy violations in Qatari organizations