Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Publisher’s note
Published in Information and computer security
(13.06.2025)
Get full text
Journal Article
Loading…
The effect of resilience and job stress on information security awareness
McCormac, Agata, Calic, Dragana, Parsons, Kathryn, Butavicius, Marcus, Pattinson, Malcolm, Lillie, Meredith
Published in Information and computer security (09.07.2018)
Published in Information and computer security (09.07.2018)
Get full text
Journal Article
Loading…
How effective are social engineering interventions? A meta-analysis
Bullee, Jan-Willem, Junger, Marianne
Published in Information management & computer security (04.11.2020)
Published in Information management & computer security (04.11.2020)
Get full text
Journal Article
Loading…
Information and cyber security maturity models: a systematic literature review
Rabii, Anass, Assoul, Saliha, Ouazzani Touhami, Khadija, Roudies, Ounsa
Published in Information management & computer security (02.10.2020)
Published in Information management & computer security (02.10.2020)
Get full text
Journal Article
Loading…
How social engineers use persuasion principles during vishing attacks
Jones, Keith S., Armstrong, Miriam E., Tornblad, McKenna K., Siami Namin, Akbar
Published in Information management & computer security (03.08.2021)
Published in Information management & computer security (03.08.2021)
Get full text
Journal Article
Loading…
Cybersecurity capabilities for critical infrastructure resilience
Malatji, Masike, Marnewick, Annlizé L, Von Solms, Suné
Published in Information management & computer security (29.03.2022)
Published in Information management & computer security (29.03.2022)
Get full text
Journal Article
Loading…
Response to a phishing attack: persuasion and protection motivation in an organizational context
Bayl-Smith, Piers, Taib, Ronnie, Yu, Kun, Wiggins, Mark
Published in Information management & computer security (31.01.2022)
Published in Information management & computer security (31.01.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Cyberbullying and cyber-mobbing in developing countries
Kintonova, Aliya, Vasyaev, Alexander, Shestak, Viktor
Published in Information management & computer security (17.08.2021)
Published in Information management & computer security (17.08.2021)
Get full text
Journal Article
Loading…
SME executives’ perceptions and the information security preparedness model
Saban, Kenneth Albert, Rau, Stephen, Wood, Charles A.
Published in Information management & computer security (03.08.2021)
Published in Information management & computer security (03.08.2021)
Get full text
Journal Article
Loading…
Evaluating user susceptibility to phishing attacks
Das, Sanchari, Nippert-Eng, Christena, Camp, L. Jean
Published in Information management & computer security (31.01.2022)
Published in Information management & computer security (31.01.2022)
Get full text
Journal Article
Loading…
Key competencies for critical infrastructure cyber-security: a systematic literature review
Chowdhury, Nabin, Gkioulos, Vasileios
Published in Information management & computer security (12.11.2021)
Published in Information management & computer security (12.11.2021)
Get full text
Journal Article
Loading…
Loading…
Exploring the meaning of usable security – a literature review
Lennartsson, Markus, Kävrestad, Joakim, Nohlberg, Marcus
Published in Information management & computer security (26.10.2021)
Published in Information management & computer security (26.10.2021)
Get full text
Journal Article