309 | -- | 323 | Mridula Shan, Jeong Yang. Investigating the accessibility and impacts of cybersecurity programs on high-school girls' long-term industry engagement |
324 | -- | 345 | Lori Baker-Eveleth, Robert W. Stone, Daniel M. Eveleth. Understanding social media users' privacy-protection behaviors |
346 | -- | 363 | Kristina Gyllensten, Anders Pousette, Marianne Törner. Value conflicts and information security - a mixed-methods study in high-risk industry |
364 | -- | 381 | Thiagarajan Ramakrishnan, Dwight M. Hite, Joseph H. Schuessler, Victor R. Prybutok. Work ethic and information security behavior |
382 | -- | 401 | Martin Karlsson, Fredrik Karlsson 0001, Joachim Åström, Thomas Denk. The effect of perceived organizational culture on employees' information security compliance |
402 | -- | 421 | Amila Withanaarachchi, Nisansala Vithana. Female underrepresentation in the cybersecurity workforce - a study on cybersecurity professionals in Sri Lanka |
422 | -- | 451 | Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh. Enterprise risk management and information technology security in the financial sector |
452 | -- | 469 | Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll. A multidisciplinary definition of privacy labels |