Search dblp for Publications

export results for "toc:db/journals/imcs/imcs31.bht:"

 download as .bib file

@article{DBLP:journals/imcs/Andersson23,
  author       = {Simon Andersson},
  title        = {Problems in information classification: insights from practice},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {449--462},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0163},
  doi          = {10.1108/ICS-10-2022-0163},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Andersson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AngaforYM23,
  author       = {Giddeon Njamngang Angafor and
                  Iryna Yevseyeva and
                  Leandros Maglaras},
  title        = {Scenario-based incident response training: lessons learnt from conducting
                  an experiential learning virtual incident response tabletop exercise},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {404--426},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2022-0085},
  doi          = {10.1108/ICS-05-2022-0085},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/AngaforYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BajwaAMB23,
  author       = {Ishtiaq Ahmad Bajwa and
                  Shabir Ahmad and
                  Maqsood Mahmud and
                  Farooq Ahmad Bajwa},
  title        = {The impact of cyberattacks awareness on customers' trust and commitment:
                  an empirical evidence from the Pakistani banking sector},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {635--654},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0179},
  doi          = {10.1108/ICS-11-2022-0179},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/BajwaAMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BhanaO23,
  author       = {Anusha Bhana and
                  Jacques Ophoff},
  title        = {Risk homeostasis and security fatigue: a case study of data specialists},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {267--280},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0172},
  doi          = {10.1108/ICS-11-2022-0172},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BhanaO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ButlerB23,
  author       = {Kiara Jordan Butler and
                  Irwin Brown},
  title        = {{COVID-19} pandemic-induced organisational cultural shifts and employee
                  information security compliance behaviour: a South African case study},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {221--243},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2022-0152},
  doi          = {10.1108/ICS-09-2022-0152},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ButlerB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChhetriM23,
  author       = {Chola Chhetri and
                  Vivian Genaro Motti},
  title        = {Enhancing the design of data-related privacy controls for smart home
                  devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {368--384},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0173},
  doi          = {10.1108/ICS-11-2022-0173},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ChhetriM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChowdhuryAT23,
  author       = {Noman H. Chowdhury and
                  Marc T. P. Adam and
                  Timm Teubner},
  title        = {Rushing for security: a document analysis on the sources and effects
                  of time pressure on organizational cybersecurity},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {504--526},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-01-2021-0013},
  doi          = {10.1108/ICS-01-2021-0013},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ChowdhuryAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChuaKW23,
  author       = {Hui Na Chua and
                  Vi Vien Khor and
                  Siew Fan Wong},
  title        = {Examining the effect of different knowledge aspects on information
                  security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {427--448},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0183},
  doi          = {10.1108/ICS-11-2022-0183},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ChuaKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ClarkeF23,
  author       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Editorial: Human aspects of cyber security},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {265--266},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-07-2023-213},
  doi          = {10.1108/ICS-07-2023-213},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ClarkeF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DouhaRTK23,
  author       = {N'guessan Yves{-}Roland Douha and
                  Karen Renaud and
                  Yuzo Taenaka and
                  Youki Kadobayashi},
  title        = {Smart home cybersecurity awareness and behavioral incentives},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {545--575},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-03-2023-0032},
  doi          = {10.1108/ICS-03-2023-0032},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/DouhaRTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ebot23,
  author       = {Alain Tambe Ebot},
  title        = {Advance fee fraud scammers' criminal expertise and deceptive strategies:
                  a qualitative case study},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {478--503},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-01-2022-0007},
  doi          = {10.1108/ICS-01-2022-0007},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Ebot23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FordAGD23,
  author       = {Adrian Ford and
                  Ameer Al{-}Nemrat and
                  Seyed Ali Ghorashi and
                  Julia Claire Davidson},
  title        = {The impact of {GDPR} infringement fines on the market value of firms},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {51--64},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-03-2022-0049},
  doi          = {10.1108/ICS-03-2022-0049},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FordAGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FortinH23,
  author       = {Anne Fortin and
                  Sylvie H{\'{e}}roux},
  title        = {Limited usefulness of firm-provided cybersecurity information in institutional
                  investors' investment analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {108--123},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-07-2022-0122},
  doi          = {10.1108/ICS-07-2022-0122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FortinH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GafniL23,
  author       = {Ruti Gafni and
                  Yair Levy},
  title        = {Experts' feedback on the cybersecurity footprint elements: in pursuit
                  of a quantifiable measure of SMBs' cybersecurity posture},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {601--623},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2023-0083},
  doi          = {10.1108/ICS-05-2023-0083},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/GafniL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GlasVRBP23,
  author       = {Magdalena Glas and
                  Manfred Vielberth and
                  Tobias Reittinger and
                  Fabian B{\"{o}}hm and
                  G{\"{u}}nther Pernul},
  title        = {Improving cybersecurity skill development through visual programming},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {316--330},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0170},
  doi          = {10.1108/ICS-11-2022-0170},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GlasVRBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GyllenstenTP23,
  author       = {Kristina Gyllensten and
                  Marianne T{\"{o}}rner and
                  Anders Pousette},
  title        = {The impact of psychosocial working conditions on information security
                  behaviour in the nuclear industry},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {32--50},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2022-0089},
  doi          = {10.1108/ICS-05-2022-0089},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GyllenstenTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/H23,
  author       = {Haritha P. H.},
  title        = {Mobile payment service adoption: understanding customers for an application
                  of emerging financial technology},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {145--171},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-04-2022-0058},
  doi          = {10.1108/ICS-04-2022-0058},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/H23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KannelonningK23,
  author       = {Kristian Kannel{\o}nning and
                  Sokratis K. Katsikas},
  title        = {A systematic literature review of how cybersecurity-related behavior
                  has been assessed},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {463--477},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-08-2022-0139},
  doi          = {10.1108/ICS-08-2022-0139},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/KannelonningK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/LindqvistK23,
  author       = {Gunnar Lindqvist and
                  Joakim K{\"{a}}vrestad},
  title        = {How privacy concerns impact Swedish citizens' willingness to report
                  crimes: a quantitative mobile phone survey},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {304--315},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0167},
  doi          = {10.1108/ICS-10-2022-0167},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/LindqvistK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MathieuT23,
  author       = {Richard G. Mathieu and
                  Alan E. Turovlin},
  title        = {Lost in the middle - a pragmatic approach for {ERP} managers to prioritize
                  known vulnerabilities by applying classification and regression trees
                  {(CART)}},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {655--674},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-02-2023-0027},
  doi          = {10.1108/ICS-02-2023-0027},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/MathieuT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Mujeye23,
  author       = {Stephen Mujeye},
  title        = {An analysis of differences in behaviors and practices of security-conscious
                  users and regular users on mobile devices},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {624--634},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2023-0086},
  doi          = {10.1108/ICS-05-2023-0086},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/Mujeye23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PalanisamyS23,
  author       = {Ramaraj Palanisamy and
                  Yi Shi},
  title        = {Users' attitude on perceived security of mobile cloud computing: empirical
                  evidence from {SME} users in China},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {65--87},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-03-2022-0048},
  doi          = {10.1108/ICS-03-2022-0048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PalanisamyS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/PharrisP23,
  author       = {Lily Pharris and
                  Begona Perez{-}Mira},
  title        = {Preventing social engineering: a phenomenological inquiry},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {1--31},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2021-0137},
  doi          = {10.1108/ICS-09-2021-0137},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/PharrisP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RiemenschneiderBB23,
  author       = {Cynthia K. Riemenschneider and
                  Laurie L. Burney and
                  Saman Bina},
  title        = {The influence of organizational values on employee attitude and information
                  security behavior: the mediating role of psychological capital},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {172--198},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0156},
  doi          = {10.1108/ICS-10-2022-0156},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RiemenschneiderBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/RostamiKG23,
  author       = {Elham Rostami and
                  Fredrik Karlsson and
                  Shang Gao},
  title        = {Policy components - a conceptual model for modularizing and tailoring
                  of information security policies},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {331--352},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2022-0160},
  doi          = {10.1108/ICS-10-2022-0160},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/RostamiKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShahA23,
  author       = {Pintu Shah and
                  Anuja Agarwal},
  title        = {Cyber Suraksha: a card game for smartphone security awareness},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {576--600},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-05-2022-0087},
  doi          = {10.1108/ICS-05-2022-0087},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ShahA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShaheenZ23,
  author       = {Khalid Shaheen and
                  Ali Hussein Zolait},
  title        = {The impacts of the cyber-trust program on the cybersecurity maturity
                  of government entities in the Kingdom of Bahrain},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {529--544},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-06-2022-0108},
  doi          = {10.1108/ICS-06-2022-0108},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ShaheenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShanleyJSC23,
  author       = {Aleatha Shanley and
                  Mike Johnstone and
                  Patryk Szewczyk and
                  Michael Crowley},
  title        = {An exploration of Australian attitudes towards privacy},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {353--367},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0171},
  doi          = {10.1108/ICS-11-2022-0171},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShanleyJSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ShojaifarF23,
  author       = {Alireza Shojaifar and
                  Samuel A. Fricker},
  title        = {Design and evaluation of a self-paced cybersecurity tool},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {244--262},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2021-0145},
  doi          = {10.1108/ICS-09-2021-0145},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ShojaifarF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/SmithSBB23,
  author       = {Katherine Taken Smith and
                  Lawrence Murphy Smith and
                  Marcus Burger and
                  Erik S. Boyle},
  title        = {Cyber terrorism cases and stock market valuation effects},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {385--403},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2022-0147},
  doi          = {10.1108/ICS-09-2022-0147},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/SmithSBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TariqMATM23,
  author       = {Aamna Tariq and
                  Jawad Manzoor and
                  Muhammad Ammar Aziz and
                  Zain Ul Abideen Tariq and
                  Ammar Masood},
  title        = {Open source {SIEM} solutions for an enterprise},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {88--107},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-09-2021-0146},
  doi          = {10.1108/ICS-09-2021-0146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TariqMATM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TegethoffSDC23,
  author       = {Thomas M. Tegethoff and
                  Ricardo Santa and
                  Glaucya Da{\'{u}} and
                  Jimy Cortes},
  title        = {Online security in e-government as an antecedent of cost-effectiveness
                  and quality in business operations},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {125--144},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-10-2021-0159},
  doi          = {10.1108/ICS-10-2021-0159},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TegethoffSDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Veiga23,
  author       = {Ad{\'{e}}le da Veiga},
  title        = {A model for information security culture with creativity and innovation
                  as enablers - refined with an expert panel},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {281--303},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2022-0178},
  doi          = {10.1108/ICS-11-2022-0178},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Veiga23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/XuR23,
  author       = {Tianhao Xu and
                  Prashanth Rajivan},
  title        = {Determining psycholinguistic features of deception in phishing messages},
  journal      = {Inf. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {199--220},
  year         = {2023},
  url          = {https://doi.org/10.1108/ICS-11-2021-0185},
  doi          = {10.1108/ICS-11-2021-0185},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/XuR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics