Skip to Main Content
Close
Journals
Books
Case Studies
Collections
Open Access
Citation Manager
Journals
Books
Case Studies
Collections
Open Access
Citation Manager
Search Dropdown Menu
header search
search input
Search input auto suggest
filter your search
All Content
All Journals
Information and Computer Security
Search
Advanced Search
Cart
User Tools Dropdown
Cart
Register
Sign In
Open Menu
Information and Computer Security
Toggle Menu
Menu
Journal Home
Issues
About this Journal
Open External Link
Earlycite Articles
Issues
Select Year
2026
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
Issue
10 May - Volume 29, Issue 1, Pages 1 - 206
3 August - Volume 29, Issue 2, Pages 209 - 391
17 August - Volume 29, Issue 3, Pages 393 - 569
26 October - Volume 29, Issue 4, Pages 573 - 693
12 November - Volume 29, Issue 5, Pages 697 - 882
Volume 29, Issue 2
3 August 2021
All Issues
Cover Image
Cover Image
ISSN
2056-4961
EISSN
2056-497X
Close navigation menu
Issue Navigation
Developing an information classification method
Erik Bergström
;
Fredrik Karlsson
;
Rose-Mharie Åhlfeldt
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for Developing an information classification method
Forming digital identities in social networks: the role of privacy concerns and self-esteem
Thanos Papaioannou
;
Aggeliki Tsohou
;
Maria Karyda
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for Forming digital identities in social networks: the role of privacy concerns and self-esteem
“SME executives’ perceptions and the information security preparedness model”
Kenneth Albert Saban
;
Stephen Rau
;
Charles A. Wood
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for “SME executives’ perceptions and the information security preparedness model”
A look into user privacy andthird-party applications in Facebook
Sovantharith Seng
;
Mahdi Nasrullah Al-Ameen
;
Matthew Wright
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for A look into user privacy andthird-party applications in Facebook
How social engineers use persuasion principles during vishing attacks
Keith S. Jones
;
Miriam E. Armstrong
;
McKenna K. Tornblad
;
Akbar Siami Namin
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for How social engineers use persuasion principles during vishing attacks
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information
Manfred Vielberth
;
Ludwig Englbrecht
;
Günther Pernul
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information
The human factor: assessing individuals’ perceptions related to cybersecurity
Susan Ramlo
;
John B. Nicholas
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for The human factor: assessing individuals’ perceptions related to cybersecurity
The impact of information security initiatives on supply chain robustness and performance: an empirical study
Sindhuja P.N.
Abstract
View article
titled, SCM.SharedControls.Infrastructure.TitleDisplayModel?.Text
Open the
PDF
for in another window
Add to Citation Manager
for The impact of information security initiatives on supply chain robustness and performance: an empirical study
Latest
Most Read
Most Cited
Guest editorial: HAISA 2024 special issue
A Reward-Driven bloom’s taxonomy framework for cybersecurity awareness: integrating cognitive learning with gamification principles
Determinants of the acceptance of cybersecurity chatbots: an extended protection motivation perspective
Evaluating cyber resilience frameworks for e-government: applicability of NIST CSF, ISO/IEC 27001 and COBIT 2019 in developing country contexts
Email alerts
Earlycite Alert
Closed Issue Alert
Latest Published Articles Alert
Close Modal
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
RSS
Current Issue RSS Feed
RSS Feed - Advance Access
Open Issues RSS Feed
Close Modal
Close Modal
This Feature Is Available To Subscribers Only
Sign In
or
Create an Account
Close Modal
Close Modal