Loading…
Loading…
Loading…
Examining the factors leading to URL fact-checking behavior among internet users
Lim, Ken Zi, Chua, Hui Na, Wong, Siew Fan
Published in Information and computer security (14.05.2025)
Published in Information and computer security (14.05.2025)
Get full text
Journal Article
Loading…
Loading…
Training for improved information security culture: a longitudinal randomized controlled trial
Grill, Martin, Sommestad, Teodor, Karlzén, Henrik, Pousette, Anders
Published in Information and computer security (02.04.2025)
Published in Information and computer security (02.04.2025)
Get full text
Journal Article
Loading…
Does security attitude really predict susceptibility to persuasion tactics in social engineering attempts?
Muhanad, Aya, Supti, Tourjana Islam, Abuelezz, Israa, Yankouskaya, Ala, Khan, Khaled M., Barhamgi, Mahmoud, Nhlabatsi, Armstrong, Ali, Raian
Published in Information and computer security (01.04.2025)
Published in Information and computer security (01.04.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Improving password policy strategies: a government employee perspective
Fitri, Resti Dwi, Hilman, Muhammad, Yazid, Setiadi
Published in Information and computer security (26.02.2025)
Published in Information and computer security (26.02.2025)
Get full text
Journal Article
Loading…
Data security and consumer trust in FinTech innovation in Germany
Stewart, Harrison, Jürjens, Jan
Published in Information management & computer security (01.01.2018)
Published in Information management & computer security (01.01.2018)
Get full text
Journal Article
Loading…
Loading…
Socio-technical systems cybersecurity framework
Malatji, Masike, Von Solms, Sune, Marnewick, Annlizé
Published in Information management & computer security (12.06.2019)
Published in Information management & computer security (12.06.2019)
Get full text
Journal Article
Loading…
Loading…
Cybersecurity and information security – what goes where?
von Solms, Basie, von Solms, Rossouw
Published in Information management & computer security (01.01.2018)
Published in Information management & computer security (01.01.2018)
Get full text
Journal Article
Loading…
Publisher’s note
Published in Information and computer security
(13.06.2025)
Get full text
Journal Article