Journal: Inf. Manag. Comput. Security

Volume 30, Issue 5

653 -- 671Dijana Peras, Renata Mekovec. A conceptualization of the privacy concerns of cloud users
672 -- 686Ebenhaeser Otto Janse van Rensburg, Reinhardt A. Botha, Rossouw von Solms. Utility indicator for emotion detection in a speaker authentication system
687 -- 704Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis, Maria Karyda 0001. BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures
705 -- 729Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis. Understanding the role of users' socio-location attributes and their privacy implications on social media
730 -- 750Vikram S. Bhadauria, Anitha Chennamaneni. Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?
751 -- 770Hao Chen, Mengya Liu, Tu Lyu. Understanding employees' information security-related stress and policy compliance intention: the roles of information security fatigue and psychological capital

Volume 30, Issue 4

473 -- 489Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong. How do non experts think about cyber attack consequences?
490 -- 516Harrison Stewart. A systematic framework to explore the determinants of information security policy development and outcomes
517 -- 548Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Rénette J. Blignaut, Angelo Cavallo. A quantification mechanism for assessing adherence to information security governance guidelines
549 -- 561Mohamad Gharib. Toward an architecture to improve privacy and informational self-determination through informed consent
562 -- 582Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios Chatzis. Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research
583 -- 614Eric Amankwa, Marianne Loock, Elmarie Kritzinger. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors
615 -- 632Suncica Hadzidedic, Silvia Berenice Fajardo Flores, Belma Ramic-Brkic. User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina
633 -- 650Marium Khalid, Mehreen Afzal, Waseem Iqbal 0001. A game model design using test bed for Malware analysis training

Volume 30, Issue 3

309 -- 323Mridula Shan, Jeong Yang. Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement
324 -- 345Lori Baker-Eveleth, Robert W. Stone, Daniel M. Eveleth. Understanding social media users' privacy-protection behaviors
346 -- 363Kristina Gyllensten, Anders Pousette, Marianne Törner. Value conflicts and information security - a mixed-methods study in high-risk industry
364 -- 381Thiagarajan Ramakrishnan, Dwight M. Hite, Joseph H. Schuessler, Victor R. Prybutok. Work ethic and information security behavior
382 -- 401Martin Karlsson, Fredrik Karlsson 0001, Joachim Åström, Thomas Denk. The effect of perceived organizational culture on employees' information security compliance
402 -- 421Amila Withanaarachchi, Nisansala Vithana. Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka
422 -- 451Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh. Enterprise risk management and information technology security in the financial sector
452 -- 469Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll. A multidisciplinary definition of privacy labels

Volume 30, Issue 2

153 -- 172Jan-Halvard Bergquist, Samantha Tinet, Shang Gao. An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality
173 -- 189Benjamin K. Ngugi, Kuo-Ting Hung, Yuanxiang John Li. Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process
190 -- 205Ana Faizi, Ali Padyab, Andreas Naess. From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden
206 -- 224Harrison Stewart. The hindrance of cloud computing acceptance within the financial sectors in Germany
225 -- 242Mark I. Hwang, Susan Helser. Cybersecurity educational games: a theoretical framework
243 -- 254Ioannis Stylios, Spyros Kokolakis, Andreas Skalkos, Sotirios Chatzis. BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes
255 -- 279Masike Malatji, Annlizé Marnewick, Suné von Solms. Cybersecurity capabilities for critical infrastructure resilience
280 -- 305Bhaveer Bhana, Stephen V. Flowerday. Usability of the login authentication process: passphrases and passwords

Volume 30, Issue 1

1 -- 18Sanchari Das, Christena Nippert-Eng, L. Jean Camp. Evaluating user susceptibility to phishing attacks
19 -- 36Xiaoyun Ye, Myung-Mook Han. An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection
37 -- 62Suganthi Manoharan, Norliza Katuk, Syahida Hassan, Rahayu Ahmad. To click or not to click the link: the factors influencing internet banking users' intention in responding to phishing emails
63 -- 78Piers Bayl-Smith, Ronnie Taib, Kun Yu, Mark W. Wiggins. Response to a phishing attack: persuasion and protection motivation in an organizational context
79 -- 96Luís Leite, Daniel Rodrigues dos Santos, Fernando Almeida. The impact of general data protection regulation on software engineering practices
97 -- 116Rima El-Khatib, Henri Barki. How different rewards tend to influence employee non-compliance with information security policies
117 -- 136Oussama Benrhouma, Ali Alzahrani, Ahmad B. Alkhodre, Abdallah Namoun, Wasim Ahmad Bhat. To sell, or not to sell: social media data-breach in second-hand Android devices
137 -- 150Ruti Gafni, Tal Pavel. Cyberattacks against the health-care sectors during the COVID-19 pandemic