Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-20 of 89
Keywords: Security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
Large-scale agile security practices in software engineering
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (3): 344–361.
Published: 11 September 2024
...Cláudia Ascenção; Henrique Teixeira; João Gonçalves; Fernando Almeida Purpose Security in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to identify and characterize the security...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (1): 53–73.
Published: 01 August 2023
...Areej Alyami; David Sammon; Karen Neville; Carolanne Mahony Purpose Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security...
Journal Articles
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps’ features and providers
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (1): 1–37.
Published: 19 July 2023
... of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns. Design/methodology/approach This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors. Findings This study finds...
Journal Articles
An exploration of Australian attitudes towards privacy
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (3): 353–367.
Published: 16 February 2023
...Aleatha Shanley; Mike Johnstone; Patryk Szewczyk; Michael Crowley Purpose Using technology to meet national security expectations and requirements is not new. Nations attempt to strike a balance between security and the (expressed or otherwise) privacy needs of citizens. Attacks (physical or cyber...
Journal Articles
Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (1): 65–87.
Published: 27 September 2022
...Ramaraj Palanisamy; Yi Shi Purpose The purpose of this paper is to rank the users’ attitude on major components of mobile cloud computing (MCC) security and investigate the degree of impact of these components on MCC security as a whole. Design/methodology/approach Hypotheses were evolved...
Journal Articles
Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (5): 730–750.
Published: 26 May 2022
... using assistive IoT devices, which was also directly influenced by anxiety and personal innovativeness. Research limitations/implications Understanding the security behaviors of IoT users will help researchers and practitioners develop preventive measures and robust security solutions for the IoT...
Journal Articles
A game model design using test bed for Malware analysis training
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (4): 633–650.
Published: 11 April 2022
... of cyber attacks as well as to evolve new techniques of detection. Cyber security trainings are generally very challenging. Cyber test beds make such trainings easy both for trainees and trainers. However, it is not feasible for each organization to build a network for the sole purpose of hands-on training...
Journal Articles
User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (4): 615–632.
Published: 18 March 2022
...Suncica Hadzidedic; Silvia Fajardo-Flores; Belma Ramic-Brkic Purpose This paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens) from a population not covered previously...
Journal Articles
Enterprise risk management and information technology security in the financial sector
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (3): 422–451.
Published: 08 February 2022
...Kwame Owusu Kwateng; Christopher Amanor; Francis Kamewor Tetteh Purpose This study aims to empirically investigate the relationship between enterprise risk management (ERM) and information technology (IT) security within the financial sector. Design/methodology/approach Risk officers...
Journal Articles
Evaluating user susceptibility to phishing attacks
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (1): 1–18.
Published: 05 January 2022
... on the detection procedure. Dhamija et al. found that visual deception can fool even sophisticated users and that a good phishing website fooled 90% of their participants (Dhamija et al., 2006a). They discussed how standard security indicators are not effective enough and analyzed the strategies...
Journal Articles
To click or not to click the link: the factors influencing internet banking users’ intention in responding to phishing emails
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (1): 37–62.
Published: 03 August 2021
... is convenient for customers, it does raise many security issues such as phishing threats and identity theft (Al-Sharafi et al., 2016). Phishers launched various phishing techniques on internet banking users. Verizon (2021) reported that 96% of phishing attacks were sent through emails containing...
Journal Articles
Bayesian evaluation of privacy-preserving risk communication for user android app preferences
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (4): 680–693.
Published: 22 June 2021
... of human decision-making during app selection and close with a discussion of the strengths of a Bayesian approach to evaluating privacy and security interventions. Design/methodology/approach The authors focused on the risk communication in mobile marketplace’s realm, examining how risk indicators can...
Journal Articles
Exploring the meaning of usable security – a literature review
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (4): 647–663.
Published: 05 April 2021
...Markus Lennartsson; Joakim Kävrestad; Marcus Nohlberg Purpose For decades, literature has reported on the perceived conflict between usability and security. This mutual trade-off needs to be considered and addressed whenever security products are developed. Achieving well-balanced levels of both...
Journal Articles
Incorporating the human facet of security in developing systems and services
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (1): 49–72.
Published: 12 August 2020
...Bilal Naqvi; Nathan Clarke; Jari Porras Purpose The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been formulated while considering key concerns raised after conducting...
Journal Articles
Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (1): 1–24.
Published: 16 July 2020
... organizations with a special focus on security and privacy issues. Design/methodology/approach This study was conducted for the identification of factors responsible for the adoption of the AI-integrated CRM system in Indian organizations focusing attention on security and privacy perspective...
Journal Articles
Security behaviour of mobile financial service users
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (5): 719–741.
Published: 27 June 2020
... conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users’ to adopt security behaviour. Design/methodology/approach A synthesis of theories – Self-efficacy...
Journal Articles
Constructing secure and memorable passwords
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (5): 701–717.
Published: 22 June 2020
...Joakim Kävrestad; Markus Lennartsson; Marcus Birath; Marcus Nohlberg Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long...
Journal Articles
PRISM: a strategic decision framework for cybersecurity risk assessment
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (4): 591–625.
Published: 17 June 2020
... of a firm with respect to its cybersecurity posture. The goal is to assist top-management-team with tailoring their decision-making about security investments while managing cyber risk at their organization. Design/methodology/approach A thematic analysis of existing publications using content analysis...
Journal Articles
A Clark-Wilson and ANSI role-based access control model
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 373–395.
Published: 15 June 2020
...Tamir Tsegaye; Stephen Flowerday Purpose An electronic health record (EHR) enables clinicians to access and share patient information electronically and has the ultimate goal of improving the delivery of healthcare. However, this can create security and privacy risks to patient information...
Journal Articles
Analyzing the usage of character groups and keyboard patterns in password creation
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (3): 347–358.
Published: 20 January 2020
...Joakim Kävrestad; Johan Zaxmy; Marcus Nohlberg Purpose Using passwords to keep account and data safe is very common in modern computing. The purpose of this paper is to look into methods for cracking passwords as a means of increasing security, a practice commonly used in penetration testing...
1
