Journal: Inf. Manag. Comput. Security

Volume 28, Issue 5

665 -- 680Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis. GDPR compliance: proposed technical and organizational measures for cloud provider
681 -- 700Muhamad Khairulnizam Zaini, Mohamad Noorman Masrek, Mad Khir Johari Abdullah Sani. The impact of information security management practices on organisational agility
701 -- 717Joakim Kävrestad, Markus Lennartsson, Marcus Birath, Marcus Nohlberg. Constructing secure and memorable passwords
719 -- 741Esther Dzidzah, Kwame Owusu Kwateng, Benjamin Kofi Asante. Security behaviour of mobile financial service users
743 -- 761Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng, Winfred Yaokumah. The role of norms in information security policy compliance
763 -- 800Mhamed Zineddine. A novel trust model for fog computing using fuzzy neural networks and weighted weakest link
801 -- 830Jan-Willem Bullee, Marianne Junger. How effective are social engineering interventions? A meta-analysis

Volume 28, Issue 4

485 -- 501Rima El-Khatib, Henri Barki. An activity theory approach to information security non-compliance
503 -- 529Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis. Utilizing a privacy impact assessment method using metrics in the healthcare sector
531 -- 553Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo. Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
555 -- 574Rika Butler. A systematic literature review of the factors affecting smartphone user threat avoidance behaviour
575 -- 589Antonia Michael, Jan Eloff. Discovering "Insider IT Sabotage" based on human behaviour
591 -- 625Rajni Goel, Anupam Kumar, James Haddow. PRISM: a strategic decision framework for cybersecurity risk assessment
627 -- 644Rabii Anass, Assoul Saliha, Khadija Ouazzani Touhami, Ounsa Roudiès. Information and cyber security maturity models: a systematic literature review
645 -- 662Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda 0001. From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls

Volume 28, Issue 3

321 -- 345Opeoluwa Ore Akinsanya, Maria Papadaki, Lingfen Sun. Towards a maturity model for health-care cloud security (M2HCS)
347 -- 358Joakim Kävrestad, Johan Zaxmy, Marcus Nohlberg. Analyzing the usage of character groups and keyboard patterns in password creation
359 -- 371C. Bryan Foltz, Laura Foltz. Mobile users' information privacy concerns instrument and IoT
373 -- 395Tamir Tsegaye, Stephen Flowerday. A Clark-Wilson and ANSI role-based access control model
397 -- 398Moufida Sadok, Peter M. Bednar. Editorial
399 -- 422Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell. Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
423 -- 444Jake Weidman, Jens Grossklags. Assessing the current state of information security policies in academic organizations
445 -- 465Sebastian Kurowski. Response biases in policy compliance research
467 -- 483Moufida Sadok, Steven Alter, Peter M. Bednar. It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs

Volume 28, Issue 2

133 -- 159Cong Hiep Pham 0001, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan UlHaq, Mathews Zanda Nkhoma, Minh Nhat Nguyen. Enhancing cyber security behavior: an internal social marketing approach
161 -- 181Ibrahim M. Al-Jabri, Mustafa I. M. Eid, Amer Abed. The willingness to disclose personal information
183 -- 197Paola Mavriki, Maria Karyda 0001. Automated data-driven profiling: threats for group privacy
199 -- 213Wafa Bouaynaya. Cloud computing in SMEs: towards delegation of the CIO role
215 -- 259Elham Rostami, Fredrik Karlsson 0001, Ella Kolkowska. The hunt for computerized support in information security policy management
261 -- 292Stef Schinagl, Abbas Shahim. What do we know about information security governance?
293 -- 318Pintu Shah, Anuja Agarwal. Cybersecurity behaviour of smartphone users in India: an empirical analysis

Volume 28, Issue 1

1 -- 14Malcolm R. Pattinson, Marcus A. Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac. Matching training to individual learning styles improves information security awareness
15 -- 34Nabil Moukafih, Ghizlane Orhanou, Said Elhajji 0001. Mobile agent-based SIEM for event collection and normalization externalization
35 -- 53Konstantina Vemou, Maria Karyda 0001. Evaluating privacy impact assessment methods: guidelines and best practice
54 -- 67Hayretdin Bahsi, Ulrik Franke, Even Langfeldt Friberg. The cyber-insurance market in Norway
68 -- 96Konstantina Vemou, Maria Karyda 0001. Requirements for private communications over public spheres
97 -- 115Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter, Brian J. Reithel. Patient use of online medical records: an application of technology acceptance framework
116 -- 132Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis. AppAware: a policy visualization model for mobile applications