Journal: Inf. Manag. Comput. Security

Volume 27, Issue 5

0 -- 0Rena Lavranou, Aggeliki Tsohou. Developing and validating a common body of knowledge for information privacy
0 -- 0Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, John Sören Pettersson. Making secret sharing based cloud storage usable
0 -- 0Oleksii Osliak, Andrea Saracino, Fabio Martinelli. A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing
0 -- 0Verena Zimmermann, Nina Gerber, Peter Mayer, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt. Keep on rating - on the systematic rating and comparison of authentication schemes
0 -- 0Lamya Abdullah, Juan Quintero. Sealed computation: a mechanism to support privacy-aware trustworthy cloud service
0 -- 0Andrew M'manga, Shamal Faily, John McAlaney, Chris Williams 0001, Youki Kadobayashi, Daisuke Miyamoto. A normative decision-making model for cyber security
0 -- 0Vasiliki Diamantopoulou, Haralambos Mouratidis. Practical evaluation of a reference architecture for the management of privacy level agreements

Volume 27, Issue 4

0 -- 0Estée van der Walt, Jan H. P. Eloff. Identity deception detection: requirements and a model
0 -- 0Leigh A. Mutchler. Response awareness and instructional self-efficacy: influences on intent
0 -- 0Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie Williams. Collaborative security risk estimation in agile software development
0 -- 0Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre. An experimental evaluation of bow-tie analysis for security
0 -- 0Jacqueline M. Archibald, Karen Renaud. Refining the PoinTER "human firewall" pentesting framework

Volume 27, Issue 3

326 -- 342Ioanna Topa, Maria Karyda. From theory to practice: guidelines for enhancing information security management
343 -- 357Mark Glenn Evans, Ying He 0004, Iryna Yevseyeva, Helge Janicke. Published incidents and their proportions of human error
358 -- 372Erik Bergström, Martin Lundgren, Åsa Ericson. Revisiting information security risk management challenges: a practice perspective
373 -- 392Adenekan Dedeke, Katherine Masterson. Contrasting cybersecurity implementation frameworks (CIF) from three countries
393 -- 410Maria Bada, Jason R. C. Nurse. Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)
411 -- 433Peace Kumah, Winfred Yaokumah, Eric Saviour Aryee Okai. A conceptual model and empirical assessment of HR security risk management
434 -- 452Abdul Wahid Mir, Ramachandran Ramkumar Ketti. Security gaps assessment of smart grid based SCADA systems
453 -- 467Joakim Kävrestad, Fredrik Eriksson, Marcus Nohlberg. Understanding passwords - a taxonomy of password creation strategies
468 -- 488Nancy K. Lankton, Charles T. Stivason, Anil Gurung. Information protection behaviors: morality and organizational criticality

Volume 27, Issue 2

146 -- 164Frans Nel, Lynette Drevin. Key elements of an information security culture in organisations
165 -- 188Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew, Mariati Norhashim. Security monitoring and information security assurance behaviour among employees
189 -- 220David Lewis Coss, Gurpreet Dhillon. Cloud privacy objectives a value based approach
221 -- 232Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham, Fatimah Alkhudhayr. The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language
233 -- 272Masike Malatji, Suné von Solms, Annlizé Marnewick. Socio-technical systems cybersecurity framework
273 -- 291Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios A. Baltatzis, George J. Pangalos. Actionable threat intelligence for digital forensics readiness
292 -- 323Omerah Yousuf, Roohie Naaz Mir. A survey on the Internet of Things security

Volume 27, Issue 1

2 -- 25Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke. A framework for reporting and dealing with end-user security policy compliance
26 -- 46Mohamed Abdelhamid, Victoria Kisekka, Spyridon Samonas. Mitigating e-services avoidance: the role of government cybersecurity preparedness
47 -- 61Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel, Norhamadi Ja'affar. A review of security assessment methodologies in industrial control systems
62 -- 80Vinayak Agrawal, Shashikala Tapaswi. Forensic analysis of Google Allo messenger on Android platform
81 -- 100Mohd Aizuddin Zainal Abidin, Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin. Customer data security and theft: a Malaysian organization's experience
101 -- 121Melissa Carlton, Yair Levy, Michelle M. Ramim. Mitigating cyber attacks through the measurement of non-IT professionals' cybersecurity skills
122 -- 142Salvatore Aurigemma, Thomas Mattson. Effect of long-term orientation on voluntary security actions