Loading…
A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)
Kävrestad, Joakim, Burvall, Felicia, Nohlberg, Marcus
Published in Information and computer security (29.04.2025)
Published in Information and computer security (29.04.2025)
Get full text
Journal Article
Loading…
Visualising personas as goal models to find security tensions
Faily, Shamal, Iacob, Claudia, Ali, Raian, Ki-Aries, Duncan
Published in Information management & computer security (12.11.2021)
Published in Information management & computer security (12.11.2021)
Get full text
Journal Article
Loading…
Loading…
Health status: the pivot point in trusting smart health-care systems and providers for use
Alshare, Khaled, Moqbel, Murad, Alam, Maliha, Hanna, Moler
Published in Information and computer security (13.06.2025)
Published in Information and computer security (13.06.2025)
Get full text
Journal Article
Loading…
Information security policy compliance: a replication study in Ethiopia
Aebissa, Berhanu, Dhillon, Gurpreet, Meshesha, Million
Published in Information and computer security (13.06.2025)
Published in Information and computer security (13.06.2025)
Get full text
Journal Article
Loading…
Addressing the necessity of cybersecurity literacy: the case of ETTCS CyberTeach project
Xenakis, Apostolos, Vlachos, Vasileios, Roig, Pedro Juan, Alcaraz, Salvador
Published in Information and computer security (13.06.2025)
Published in Information and computer security (13.06.2025)
Get full text
Journal Article
Loading…
Loading…
Large-scale agile security practices in software engineering
Ascenção, Cláudia, Teixeira, Henrique, Gonçalves, João, Almeida, Fernando
Published in Information and computer security (13.06.2025)
Published in Information and computer security (13.06.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Incorporating the human facet of security in developing systems and services
Naqvi, Bilal, Clarke, Nathan, Porras, Jari
Published in Information management & computer security (10.05.2021)
Published in Information management & computer security (10.05.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Evaluating privacy impact assessment methods: guidelines and best practice
Vemou, Konstantina, Karyda, Maria
Published in Information management & computer security (03.04.2020)
Published in Information management & computer security (03.04.2020)
Get full text
Journal Article
Loading…
Optimism bias in susceptibility to phishing attacks: an empirical study
Owen, Morné, Flowerday, Stephen V., van der Schyff, Karl
Published in Information and computer security (20.11.2024)
Published in Information and computer security (20.11.2024)
Get full text
Journal Article
Loading…