Skip to Main Content
Skip Nav Destination
Keywords: Security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2025) 33 (3): 344–361.
Published: 11 September 2024
...Cláudia Ascenção; Henrique Teixeira; João Gonçalves; Fernando Almeida Purpose Security in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to identify and characterize the security...
Journal Articles
Journal Articles
Journal Articles
Information and Computer Security (2023) 31 (3): 353–367.
Published: 16 February 2023
...Aleatha Shanley; Mike Johnstone; Patryk Szewczyk; Michael Crowley Purpose Using technology to meet national security expectations and requirements is not new. Nations attempt to strike a balance between security and the (expressed or otherwise) privacy needs of citizens. Attacks (physical or cyber...
Journal Articles
Journal Articles
Information and Computer Security (2022) 30 (5): 730–750.
Published: 26 May 2022
... using assistive IoT devices, which was also directly influenced by anxiety and personal innovativeness. Research limitations/implications Understanding the security behaviors of IoT users will help researchers and practitioners develop preventive measures and robust security solutions for the IoT...
Journal Articles
Information and Computer Security (2022) 30 (4): 633–650.
Published: 11 April 2022
... of cyber attacks as well as to evolve new techniques of detection. Cyber security trainings are generally very challenging. Cyber test beds make such trainings easy both for trainees and trainers. However, it is not feasible for each organization to build a network for the sole purpose of hands-on training...
Journal Articles
Journal Articles
Information and Computer Security (2022) 30 (3): 422–451.
Published: 08 February 2022
...Kwame Owusu Kwateng; Christopher Amanor; Francis Kamewor Tetteh Purpose This study aims to empirically investigate the relationship between enterprise risk management (ERM) and information technology (IT) security within the financial sector. Design/methodology/approach Risk officers...
Journal Articles
Information and Computer Security (2022) 30 (1): 1–18.
Published: 05 January 2022
... on the detection procedure. Dhamija et al. found that visual deception can fool even sophisticated users and that a good phishing website fooled 90% of their participants (Dhamija et al., 2006a). They discussed how standard security indicators are not effective enough and analyzed the strategies...
Journal Articles
Journal Articles
Information and Computer Security (2021) 29 (4): 680–693.
Published: 22 June 2021
... of human decision-making during app selection and close with a discussion of the strengths of a Bayesian approach to evaluating privacy and security interventions. Design/methodology/approach The authors focused on the risk communication in mobile marketplace’s realm, examining how risk indicators can...
Journal Articles
Information and Computer Security (2021) 29 (4): 647–663.
Published: 05 April 2021
...Markus Lennartsson; Joakim Kävrestad; Marcus Nohlberg Purpose For decades, literature has reported on the perceived conflict between usability and security. This mutual trade-off needs to be considered and addressed whenever security products are developed. Achieving well-balanced levels of both...
Journal Articles
Information and Computer Security (2021) 29 (1): 49–72.
Published: 12 August 2020
...Bilal Naqvi; Nathan Clarke; Jari Porras Purpose The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting...
Journal Articles
Information and Computer Security (2021) 29 (1): 1–24.
Published: 16 July 2020
... organizations with a special focus on security and privacy issues. Design/methodology/approach This study was conducted for the identification of factors responsible for the adoption of the AI-integrated CRM system in Indian organizations focusing attention on security and privacy perspective...
Journal Articles
Information and Computer Security (2020) 28 (5): 719–741.
Published: 27 June 2020
... conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour. Design/methodology/approach A synthesis of theories – Self-efficacy...
Journal Articles
Information and Computer Security (2020) 28 (5): 701–717.
Published: 22 June 2020
...Joakim Kävrestad; Markus Lennartsson; Marcus Birath; Marcus Nohlberg Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long...
Journal Articles
Information and Computer Security (2020) 28 (4): 591–625.
Published: 17 June 2020
... of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis...
Journal Articles
Information and Computer Security (2020) 28 (3): 373–395.
Published: 15 June 2020
...Tamir Tsegaye; Stephen Flowerday Purpose An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information...
Journal Articles
Information and Computer Security (2020) 28 (3): 347–358.
Published: 20 January 2020
...Joakim Kävrestad; Johan Zaxmy; Marcus Nohlberg Purpose Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing security, a practice commonly used in penetration testing...

or Create an Account

Close Modal
Close Modal