Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Government
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Do users’ mental models of hackers affect their perceived susceptibility to and the perceived severity of phishing attacks?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security 1–17.
Published: 10 February 2026
... or government mental models perceived their susceptibility to phishing attacks differently than one another. Determine whether users who endorsed either the graffiti artist, burglar, big fish, contractor, vigilante or government mental models perceived the severity of phishing attacks...
Journal Articles
Improving password policy strategies: a government employee perspective
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (4): 547–572.
Published: 26 February 2025
..., 2021 ; Florencio and Herley, 2007). Password-based authentication systems have been ingrained in most organizational and governmental IT infrastructures, mainly because of their long history of use and ease of integration with existing systems (Imamaliyev and Khudoykulov, 2021). However, its...
Journal Articles
Comparison of sub‐Saharan Africa's e‐government status with developed and transitional nations
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (3): 235–250.
Published: 18 July 2008
...Stephen M. Mutula Purpose The purpose of this paper is to compare the e‐government status of sub‐Saharan African countries with developed and transitional countries. Design/methodology/approach The paper is based on an analysis of eRepublic.org web directory and desk research. Besides...
Journal Articles
Government initiatives in information technology security
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1997) 5 (3): 111–118.
Published: 01 August 1997
... . 13 Rand , Information War and Cyberspace Security , Rand Research Review , Vol XIX No. 2, Fall 1995. 14 Deutch , J.M. , DCI Testimony to the US Senate Committee on Governmental Affairs; Permanent Subcommittee on Investigations , 25 June 1996, at http://www.odci.gov/cia...
Journal Articles
Optimum Information Technology for Socioeconomic Development
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (1): 4–11.
Published: 01 March 1994
... a linkage between socioeconomic factors and information technology programs. © MCB UP Limited 1994 Analytical hierarchy process Government Information technology Policy Quality function deployment Social economics Strategic industries In this article, we present a strategic model...
