Journal: Inf. Manag. Comput. Security

Volume 26, Issue 5

514 -- 532Rika Butler, Martin Butler. Assessing the information quality of phishing-related content on financial institutions' websites
533 -- 550Teodor Sommestad. Work-related groups and information security policy compliance
551 -- 567Stefan Fenz, Thomas Neubauer. Ontology-based information security compliance determination and control selection on the example of ISO 27002
568 -- 583Zakarya A. Alzamil. Information security practice in Saudi Arabia: case study on Saudi organizations
584 -- 612Adéle da Veiga. An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture
613 -- 636Gunikhan Sonowal, K. S. Kuppusamy. MMSPhiD: a phoneme based phishing verification model for persons with visual impairments
637 -- 652Samuel Tweneboah-Koduah, Francis Atsu, William J. Buchanan. Impact of cyberattacks on stock performance: a comparative study

Volume 26, Issue 4

382 -- 400Vasiliki Diamantopoulou, Haralambos Mouratidis. Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
401 -- 419Alain Claude Tambe Ebot. Using stage theorizing to make anti-phishing recommendations more effective
420 -- 436Eric Amankwa, Marianne Loock, Elmarie Kritzinger. Establishing information security policy compliance culture in organizations
437 -- 453Majed Alshammari, Andrew Simpson. A model-based approach to support privacy compliance
454 -- 471Simon N. Foley, Vivien M. Rooney. A grounded theory approach to security policy elicitation
472 -- 490Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish. Risk-aware decision support with constrained goal models
491 -- 512Natalia G. Miloslavskaya. Designing blockchain-based SIEM 3.0 system

Volume 26, Issue 3

262 -- 263Steven Furnell, Nathan L. Clarke. Guest editorial
264 -- 276Jurjen Jansen, Paul van Schaik. Persuading end users to act cautiously online: a fear appeals study on phishing
277 -- 289Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus A. Butavicius, Malcolm Robert Pattinson, Meredith Lillie. The effect of resilience and job stress on information security awareness
290 -- 305Dirk Snyman, Hennie A. Kruger, Wayne D. Kearney. I shall, we shall, and all others will: paradoxical information security behaviour
306 -- 326Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell. Identifying and predicting the factors affecting end-users' risk-taking behavior
327 -- 337Debi Ashenden. In their own words: employee attitudes towards information security
338 -- 364Adéle da Veiga. An information privacy culture instrument to measure consumer privacy expectations and confidence
365 -- 378Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage. Security questions education: exploring gamified features and functionalities

Volume 26, Issue 2

146 -- 149Fredrik Karlsson, Ella Kolkowska, Marianne Törner. Guest editorial
150 -- 170Zhiling Tu, Yufei Yuan, Norm Archer, Catherine E. Connelly. Strategic value alignment for information security management: a critical success factor analysis
171 -- 193Miranda Kajtazi, Hasan Cavusoglu, Izak Benbasat, Darek M. Haftor. Escalation of commitment as an antecedent to noncompliance with information security policy
194 -- 212Kane Smith, Gurpreet Dhillon, Karin Hedström. Reconciling value-based objectives for security and identity management
213 -- 229Martin Karlsson, Thomas Denk, Joachim Åström. Perceptions of organizational culture and value conflicts in information security management
230 -- 245Ali Alper Yayla, Yu Lei. Information security policies and value conflict in multinational companies
246 -- 258Joakim Berndtsson, Peter Johansson, Martin Karlsson. Value conflicts and non-compliance: Attitudes to whistleblowing in Swedish organisations

Volume 26, Issue 1

2 -- 9Basie von Solms, Rossouw von Solms. Cybersecurity and information security - what goes where?
10 -- 38Mathew Nicho. A process model for implementing information systems security governance
39 -- 57Andrew Stewart. A utilitarian re-examination of enterprise-scale information security management
58 -- 90Rashmi Anand, Sanjay Medhavi, Vivek Soni, Charru Malhotra, D. K. Banwet. Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance)
91 -- 108Khaled A. Alshare, Peggy Lane, Michael R. Lane. Information security policy compliance: a higher education case study
109 -- 128Harrison Stewart, Jan Jürjens. Data security and consumer trust in FinTech innovation in Germany
129 -- 144Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin. Employee fraud and misconduct: empirical evidence from a telecommunication company