Journal: Inf. Manag. Comput. Security

Volume 32, Issue 1

1 -- 37Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal. Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers
38 -- 52Martina Neri, Federico Niccolini, Luigi Martino. Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment
53 -- 73Areej Alyami, David Sammon, Karen Neville, Carolanne Mahony. Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
74 -- 92Manimay Dev, Debashis Saha. Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation
93 -- 111Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O'Sullivan. Analytical hierarchy process model for managing cloud security
112 -- 129Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo. Framework for critical information infrastructure protection in smart government: a case study in Indonesia