485 | -- | 501 | Rima El-Khatib, Henri Barki. An activity theory approach to information security non-compliance |
503 | -- | 529 | Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas Lambrinoudakis. Utilizing a privacy impact assessment method using metrics in the healthcare sector |
531 | -- | 553 | Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo. Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform |
555 | -- | 574 | Rika Butler. A systematic literature review of the factors affecting smartphone user threat avoidance behaviour |
575 | -- | 589 | Antonia Michael, Jan Eloff. Discovering "Insider IT Sabotage" based on human behaviour |
591 | -- | 625 | Rajni Goel, Anupam Kumar, James Haddow. PRISM: a strategic decision framework for cybersecurity risk assessment |
627 | -- | 644 | Rabii Anass, Assoul Saliha, Khadija Ouazzani Touhami, Ounsa Roudiès. Information and cyber security maturity models: a systematic literature review |
645 | -- | 662 | Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria Karyda 0001. From ISO/IEC27001: 2013 and ISO/IEC27002: 2013 to GDPR compliance controls |