1 | -- | 37 | Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal. Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps' features and providers |
38 | -- | 52 | Martina Neri, Federico Niccolini, Luigi Martino. Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment |
53 | -- | 73 | Areej Alyami, David Sammon, Karen Neville, Carolanne Mahony. Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives |
74 | -- | 92 | Manimay Dev, Debashis Saha. Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation |
93 | -- | 111 | Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O'Sullivan. Analytical hierarchy process model for managing cloud security |
112 | -- | 129 | Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo. Framework for critical information infrastructure protection in smart government: a case study in Indonesia |