Loading…
Users’ perception of cybersecurity, trust and cloud computing providers’ performance
Xu, Hongjiang, Mahenthiran, Sakthi
Published in Information management & computer security (12.11.2021)
Published in Information management & computer security (12.11.2021)
Get full text
Journal Article
Loading…
Loading…
The human factor: assessing individuals’ perceptions related to cybersecurity
Ramlo, Susan, Nicholas, John B.
Published in Information management & computer security (03.08.2021)
Published in Information management & computer security (03.08.2021)
Get full text
Journal Article
Loading…
Loading…
From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls
Diamantopoulou, Vasiliki, Tsohou, Aggeliki, Karyda, Maria
Published in Information management & computer security (02.10.2020)
Published in Information management & computer security (02.10.2020)
Get full text
Journal Article
Loading…
Loading…
Spear phishing in organisations explained
Bullee, Jan-Willem, Montoya, Lorena, Junger, Marianne, Hartel, Pieter
Published in Information management & computer security (13.11.2017)
Published in Information management & computer security (13.11.2017)
Get full text
Journal Article
Loading…
Identifying and predicting the factors affecting end-users’ risk-taking behavior
Alohali, Manal, Clarke, Nathan, Li, Fudong, Furnell, Steven
Published in Information management & computer security (09.07.2018)
Published in Information management & computer security (09.07.2018)
Get full text
Journal Article
Loading…
A systematic literature review of how cybersecurity-related behavior has been assessed
Kannelønning, Kristian, Katsikas, Sokratis K.
Published in Information management & computer security (30.10.2023)
Published in Information management & computer security (30.10.2023)
Get full text
Journal Article
Loading…
Information security policy compliance: a higher education case study
Alshare, Khaled A., Lane, Peggy L., Lane, Michael R.
Published in Information management & computer security (01.01.2018)
Published in Information management & computer security (01.01.2018)
Get full text
Journal Article
Loading…
Forming digital identities in social networks: the role of privacy concerns and self-esteem
Papaioannou, Thanos, Tsohou, Aggeliki, Karyda, Maria
Published in Information management & computer security (03.08.2021)
Published in Information management & computer security (03.08.2021)
Get full text
Journal Article
Loading…
Loading…
The role of norms in information security policy compliance
Wiafe, Isaac, Koranteng, Felix Nti, Wiafe, Abigail, Obeng, Emmanuel Nyarko, Yaokumah, Winfred
Published in Information management & computer security (04.11.2020)
Published in Information management & computer security (04.11.2020)
Get full text
Journal Article
Loading…
Accessible authentication: dyslexia and password strategies
Renaud, Karen, Johnson, Graham, Ophoff, Jacques
Published in Information management & computer security (26.10.2021)
Published in Information management & computer security (26.10.2021)
Get full text
Journal Article
Loading…
A look into user’s privacy perceptions and data practices of IoT devices
Al-Ameen, Mahdi Nasrullah, Chauhan, Apoorva, Ahsan, M.A. Manazir, Kocabas, Huzeyfe
Published in Information management & computer security (26.10.2021)
Published in Information management & computer security (26.10.2021)
Get full text
Journal Article
Loading…
Loading…
“…I have my dad, sister, brother, and mom’s password”: unveiling users’ mental models of security and privacy-preserving tools
Dumaru, Prakriti, Shrestha, Ankit, Paudel, Rizu, Haverkamp, Cassity, McClain, Maryellen Brunson, Al-Ameen, Mahdi Nasrullah
Published in Information management & computer security (11.06.2024)
Published in Information management & computer security (11.06.2024)
Get full text
Journal Article