Abstract is missing.
- An Ontology for a National Cyber-Security Culture EnvironmentNoluxolo Gcaza, Rossouw von Solms, Joey Jansen van Vuuren. 1-10 [doi]
- An Information Security Culture Model Validated with Structural Equation ModellingNico Martins, Adéle da Veiga. 11-21 [doi]
- The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case StudyAdéle da Veiga. 22-33 [doi]
- A Cyber Security Culture Fostering Campaign through the Lens of Active Audience TheoryRayne Reid, Johan Van Niekerk. 34-44 [doi]
- Enlighten Information Morals through Corporate CultureAbdullah Akmubark, Nobutoshi Hatanaka, Osamu Uchida, Yukiyo Ikeda. 45-56 [doi]
- Examining Attitudes toward Information Security Behaviour using Mixed MethodsMalcolm R. Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram. 57-70 [doi]
- Inter-Organisational Information Sharing - Between a Rock and a Hard PlaceFredrik Karlsson, Ella Kolkowska, Karin Hedström, Magnus Frostenson. 71-81 [doi]
- Exploring the Link Between Behavioural Information Security Governance and Employee Information Security AwarenessWaldo Rocha Flores, Mathias Ekstedt. 82-94 [doi]
- An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive CultureAdéle da Veiga. 95-107 [doi]
- Effect of Motivation and Physical Fitness on Cyber TasksKirsi Helkala, Silje Knox, Mass Lund. 108-119 [doi]
- Studying Safe Online Banking Behaviour: A Protection Motivation Theory ApproachJurjen Jansen. 120-130 [doi]
- New Insights Into Understanding Manager's Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment FactorsMiranda Kajtazi, Ella Kolkowska, Burcu Bulgurcu. 131-140 [doi]
- Arguments For AnonymityHazel Webb, Nick Savage, Peter Millard. 141-150 [doi]
- Understanding Security Practices Deficiencies: A Contextual AnalysisMoufida Sadok, Peter M. Bednar. 151-160 [doi]
- Managing Social Engineering Attacks- Considering Human Factors and Security InvestmentReza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee. 161-171 [doi]
- Mismorphism: a Semiotic Model of Computer Security CircumventionSean W. Smith, Ross Koppel, Jim Blythe, Vijay Kothari. 172-182 [doi]
- Perceived Information Security Risk as a Function of Probability and SeverityTeodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg. 183-193 [doi]
- Understanding User Knowledge of Computer Security and Risk: A Comparative StudyCraig Thurlby, Caroline S. Langensiepen, John Haggerty, Robert Ranson. 194-203 [doi]
- Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do'Timothy Kelley, Bennett I. Bertenthal. 204-214 [doi]
- Cyber Threat Incident Handling Procedure for South African SchoolsNaume Sonhera, Elmarie Kritzinger, Marianne Loock. 215-232 [doi]
- Ethical Dilemmas and Dimensions in Penetration TestingShamal Faily, John McAlaney, Claudia Iacob. 233-242 [doi]
- The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart CityLiezel Cilliers, Stephen Flowerday. 243-255 [doi]
- Online Fraud Defence by Context Based Micro TrainingJoakim Kävrestad, Marcus Nohlberg. 256-264 [doi]
- Human factors related to the performance of intrusion detection operatorsPatrik Lif, Teodor Sommestad. 265-275 [doi]
- Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and LawyersNeil McDonald, Shamal Faily, Marcella Favale, Christos Gatzidis. 276-285 [doi]