Loading…
Loading…
Loading…
Revisiting privacy scales: an investigation into the ability of privacy scales to capture and distinguish granular privacy constructs
Farzand, Habiba, Abdelwahab Gaballah, Sarah, Macdonald, Shaun, Khamis, Mohamed, Marky, Karola
Published in Information and computer security (26.08.2025)
Published in Information and computer security (26.08.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
The hidden barriers to cyber security adoption amongst Small and Medium-Sized Enterprises
Khan, Neeshe, Furnell, Steven, Bada, Maria, Nurse, Jason R.C., Rand, Matthew
Published in Information and computer security (12.08.2025)
Published in Information and computer security (12.08.2025)
Get full text
Journal Article
Loading…
Loading…
Evolutionary game analysis on phishing scams using attacker and defender model
Aung, Thinzar, Paoprasert, Naraphorn, Anussornnitisarn, Pornthep
Published in Information and computer security (24.07.2025)
Published in Information and computer security (24.07.2025)
Get full text
Journal Article
Loading…
Loading…
Mind the gap: exploring perceptions of cyber security in the SME context
Button, Dominic James, Ophoff, Jacques, Irons, Alastair, McDonald, Sharon
Published in Information and computer security (26.06.2025)
Published in Information and computer security (26.06.2025)
Get full text
Journal Article
Loading…
Motivational factors in cybersecurity: linking theory to organizational practice
Reittinger, Tobias, Glas, Magdalena, Aminzada, Sarah, Pernul, Günther
Published in Information and computer security (26.06.2025)
Published in Information and computer security (26.06.2025)
Get full text
Journal Article
Loading…
Loading…
Beyond the direct impact of sanctions and subjective norms in cybersecurity
Prabhu, Sunitha, Kocsis, David, Lew, Tek Yew
Published in Information and computer security (24.06.2025)
Published in Information and computer security (24.06.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Understanding the impact of positive and negative user affect on information security
Srivastava, Smriti, Dhillon, Gurpreet, Kaur, Rasleen, Dhillon, Simran
Published in Information and computer security (17.06.2025)
Published in Information and computer security (17.06.2025)
Get full text
Journal Article