Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-9 of 9
Marcus Nohlberg
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
User adoption of TETRA mobile radio communication networks: an information security perspective
Open Access
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (5): 766–784.
Published: 04 June 2025
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (2): 141–160.
Published: 20 June 2024
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (4): 407–419.
Published: 01 February 2024
Journal Articles
Exploring the meaning of usable security – a literature review
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (4): 647–663.
Published: 05 April 2021
Journal Articles
Constructing secure and memorable passwords
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (5): 701–717.
Published: 22 June 2020
Journal Articles
Analyzing the usage of character groups and keyboard patterns in password creation
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 347–358.
Published: 20 January 2020
Journal Articles
Understanding passwords – a taxonomy of password creation strategies
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (3): 453–467.
Published: 11 June 2019
Journal Articles
Investigating personal determinants of phishing and the effect of national culture
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (2): 178–199.
Published: 08 June 2015
Journal Articles
User‐centred security applied to the development of a management information system
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (5): 372–381.
Published: 16 October 2007
