Journal: Inf. Manag. Comput. Security

Volume 25, Issue 5

494 -- 534Harrison Stewart, Jan Jürjens. Information security management and the human aspect in organizations
535 -- 559Hamed Taherdoost. Understanding of e-service security dimensions and its effect on quality and intention to use
560 -- 579Joyce Hoese Addae, Michael A. Brown, Xu Sun, Dave Towey, Milena Radenkovic. Measuring attitude towards personal data for adaptive cybersecurity
580 -- 592Dmitriy V. Chulkov. Escalation of commitment and information security: theories and implications
593 -- 613Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter H. Hartel. Spear phishing in organisations explained
614 -- 633Christos Kalloniatis. Incorporating privacy in the design of cloud-based systems: a conceptual meta-model
634 -- 659Takahiko Kajiyama, Murray Jennex, Theophilus B. A. Addo. To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions

Volume 25, Issue 4

358 -- 381Nicholas Charles Patterson, Michael Hobbs, Tianqing Zhu. A cyber-threat analytic model for autonomous detection of virtual property theft
382 -- 401Argha Ray, Anjali Kaushik. State transgression on electronic expression: is it for real?
402 -- 420Rogier Woltjer. Workarounds and trade-offs in information security - an exploratory study
421 -- 436Salvatore Aurigemma, Thomas Mattson. Deterrence and punishment experience impacts on ISP compliance attitudes
437 -- 453Jeremiah D. Still, Ashley A. Cain, David Schuster. Human-centered authentication guidelines
454 -- 474Jacqueline Cope, François Siewe, Feng Chen, Leandros A. Maglaras, Helge Janicke. On data leakage from non-production systems
475 -- 492Abubakar Garba Bello, David Murray, Jocelyn Armarego. A systematic approach to investigating how information security and privacy can be achieved in BYOD environments

Volume 25, Issue 3

226 -- 239Jesse Kaukola, Jukka Ruohonen, Antti Tuomisto, Sami Hyrynsalmi, Ville Leppänen. Tightroping between APT and BCI in small enterprises
240 -- 258Temesgen Kitaw Damenu, Chris Beaumont. Analysing information security in a bank using soft systems methodology
259 -- 278Noluxolo Gcaza, Rossouw von Solms, Marthie Grobler, Joey Jansen van Vuuren. A general morphological analysis: delineating a cyber-security culture
279 -- 299Fredrik Karlsson, Martin Karlsson, Joachim Åström. Measuring employees' compliance - the importance of value pluralism
300 -- 329Erastus Karanja. The role of the chief information security officer in the management of IT security
330 -- 344Hao Chen, Wenli Li. Mobile device users' privacy security assurance behavior: A technology threat avoidance perspective
345 -- 354Adrian Munteanu. Running the risk IT - more perception and less probabilities in uncertain systems

Volume 25, Issue 2

118 -- 136Lena Connolly, Michael Lang 0004, John Gathegi, J. Doug Tygar. Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study
137 -- 151Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt 0002. Productivity vs security: mitigating conflicting goals in organizations
152 -- 164Dirk Snyman, Hennie Kruger. The application of behavioural thresholds to analyse collective behaviour in information security
165 -- 180Jurjen Jansen, Paul van Schaik. Comparing three models to explain precautionary online behavioural intentions
181 -- 189Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic. Managing information security awareness at an Australian bank: a comparative study
190 -- 205Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp. Factors in an end user security expertise instrument
206 -- 222Peter Schaab, Kristian Beckers, Sebastian Pape 0001. Social engineering defence mechanisms and counteracting training strategies

Volume 25, Issue 1

2 -- 25Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain. Design and validation of a trust-based opportunity-enabled risk management system
26 -- 46Rossouw von Solms, Melanie Willett. Cloud computing assurance - a review of literature guidance
47 -- 61Hannes Holm, Teodor Sommestad. So long, and thanks for only using readily available scripts
62 -- 79Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, Emmanouil Stiakakis. Privacy-preserving recommendations in context-aware mobile environments
80 -- 99Kristen K. Greene, Yee-Yin Choong. Must I, can I? I don't understand your ambiguous password rules
100 -- 116Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang. Auditing for privacy in threshold PKE e-voting