326 | -- | 342 | Ioanna Topa, Maria Karyda. From theory to practice: guidelines for enhancing information security management |
343 | -- | 357 | Mark Glenn Evans, Ying He 0004, Iryna Yevseyeva, Helge Janicke. Published incidents and their proportions of human error |
358 | -- | 372 | Erik Bergström, Martin Lundgren, Åsa Ericson. Revisiting information security risk management challenges: a practice perspective |
373 | -- | 392 | Adenekan Dedeke, Katherine Masterson. Contrasting cybersecurity implementation frameworks (CIF) from three countries |
393 | -- | 410 | Maria Bada, Jason R. C. Nurse. Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs) |
411 | -- | 433 | Peace Kumah, Winfred Yaokumah, Eric Saviour Aryee Okai. A conceptual model and empirical assessment of HR security risk management |
434 | -- | 452 | Abdul Wahid Mir, Ramachandran Ramkumar Ketti. Security gaps assessment of smart grid based SCADA systems |
453 | -- | 467 | Joakim Kävrestad, Fredrik Eriksson, Marcus Nohlberg. Understanding passwords - a taxonomy of password creation strategies |
468 | -- | 488 | Nancy K. Lankton, Charles T. Stivason, Anil Gurung. Information protection behaviors: morality and organizational criticality |