Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-20 of 43
Nathan Clarke
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
Everyday tracking and extraordinary harm: item finder misuse in digital coercive control
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security 1–20.
Published: 02 April 2026
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (4): 405–406.
Published: 25 September 2024
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 265–266.
Published: 26 June 2023
Journal Articles
Incorporating the human facet of security in developing systems and services
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (1): 49–72.
Published: 12 August 2020
Journal Articles
A novel approach for improving information security management and awareness for home environments
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (1): 25–48.
Published: 03 August 2020
Journal Articles
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 399–422.
Published: 28 August 2019
Journal Articles
A framework for reporting and dealing with end-user security policy compliance
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (1): 2–25.
Published: 11 February 2019
Journal Articles
Guest editorial
Free
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (3): 262–263.
Published: 09 July 2018
Journal Articles
Identifying and predicting the factors affecting end-users’ risk-taking behavior
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (3): 306–326.
Published: 09 July 2018
Journal Articles
Guest editorial
Free
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (2): 138.
Published: 13 June 2016
Journal Articles
Language-independent gender identification through keystroke analysis
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2015) 23 (3): 286–301.
Published: 13 July 2015
Journal Articles
Psychosocial risks: Can their effects on the security of information systems really be ignored?
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (1): 53–65.
Published: 15 March 2013
Journal Articles
Usable secure email communications: criteria and evaluation of existing approaches
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (1): 41–52.
Published: 15 March 2013
Journal Articles
A method to calculate social networking hazard probability in definite time
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (1): 16–29.
Published: 15 March 2013
Journal Articles
Intrusion detection and the role of the system administrator
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (1): 30–40.
Published: 15 March 2013
Journal Articles
Human aspects of information security: An empirical study of intentional versus actual behavior
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (1): 5–15.
Published: 15 March 2013
Journal Articles
Death by a thousand facts: Criticising the technocratic approach to information security awareness
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (1): 29–38.
Published: 16 March 2012
Journal Articles
Combating information security apathy by encouraging prosocial organisational behaviour
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (1): 39–46.
Published: 16 March 2012
Journal Articles
Towards usable privacy policy display and management
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (1): 4–17.
Published: 16 March 2012
Journal Articles
Why do some people manage phishing e‐mails better than others?
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (1): 18–28.
Published: 16 March 2012
1
