Loading…
How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?
Abuelezz, Israa, Barhamgi, Mahmoud, Nhlabatsi, Armstrong, Khan, Khaled Md, Ali, Raian
Published in Information and computer security (13.06.2025)
Published in Information and computer security (13.06.2025)
Get full text
Journal Article
Loading…
Loading…
A review of security assessment methodologies in industrial control systems
Qassim, Qais Saif, Jamil, Norziana, Daud, Maslina, Patel, Ahmed, Ja’affar, Norhamadi
Published in Information management & computer security (11.03.2019)
Published in Information management & computer security (11.03.2019)
Get full text
Journal Article
Loading…
Constructing secure and memorable passwords
Kävrestad, Joakim, Lennartsson, Markus, Birath, Marcus, Nohlberg, Marcus
Published in Information management & computer security (04.11.2020)
Published in Information management & computer security (04.11.2020)
Get full text
Journal Article
Loading…
Validating an information privacy governance questionnaire to measure the perception of employees
Swartz, Paulus, Da Veiga, Adele, Martins, Nico
Published in Information management & computer security (12.11.2021)
Published in Information management & computer security (12.11.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Stavrou, Eliana, Piki, Andriani
Published in Information management & computer security (25.09.2024)
Published in Information management & computer security (25.09.2024)
Get full text
Journal Article
Loading…
Loading…
PRISM: a strategic decision framework for cybersecurity risk assessment
Goel, Rajni, Kumar, Anupam, Haddow, James
Published in Information management & computer security (02.10.2020)
Published in Information management & computer security (02.10.2020)
Get full text
Journal Article
Loading…
The cyber-insurance market in Norway
Bahşi, Hayretdin, Franke, Ulrik, Friberg, Even Langfeldt
Published in Information management & computer security (03.04.2020)
Published in Information management & computer security (03.04.2020)
Get full text
Journal Article
Loading…
Security behaviour of mobile financial service users
Dzidzah, Esther, Owusu Kwateng, Kwame, Asante, Benjamin Kofi
Published in Information management & computer security (04.11.2020)
Published in Information management & computer security (04.11.2020)
Get full text
Journal Article
Loading…
Loading…
Smart home cybersecurity awareness and behavioral incentives
Douha, N’guessan Yves-Roland, Renaud, Karen, Taenaka, Yuzo, Kadobayashi, Youki
Published in Information management & computer security (16.11.2023)
Published in Information management & computer security (16.11.2023)
Get full text
Journal Article
Loading…
Trends and challenges in research into the human aspects of ransomware: a systematic mapping study
Murray, Garret, Falkeling, Malin, Gao, Shang
Published in Information and computer security (29.04.2025)
Published in Information and computer security (29.04.2025)
Get full text
Journal Article
Loading…