Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/imcs/imcs31.bht:"
@article{DBLP:journals/imcs/Andersson23, author = {Simon Andersson}, title = {Problems in information classification: insights from practice}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {449--462}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0163}, doi = {10.1108/ICS-10-2022-0163}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Andersson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AngaforYM23, author = {Giddeon Njamngang Angafor and Iryna Yevseyeva and Leandros Maglaras}, title = {Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {404--426}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2022-0085}, doi = {10.1108/ICS-05-2022-0085}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/AngaforYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BajwaAMB23, author = {Ishtiaq Ahmad Bajwa and Shabir Ahmad and Maqsood Mahmud and Farooq Ahmad Bajwa}, title = {The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {635--654}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0179}, doi = {10.1108/ICS-11-2022-0179}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/BajwaAMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BhanaO23, author = {Anusha Bhana and Jacques Ophoff}, title = {Risk homeostasis and security fatigue: a case study of data specialists}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {267--280}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0172}, doi = {10.1108/ICS-11-2022-0172}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BhanaO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ButlerB23, author = {Kiara Jordan Butler and Irwin Brown}, title = {{COVID-19} pandemic-induced organisational cultural shifts and employee information security compliance behaviour: a South African case study}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {221--243}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2022-0152}, doi = {10.1108/ICS-09-2022-0152}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ButlerB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChhetriM23, author = {Chola Chhetri and Vivian Genaro Motti}, title = {Enhancing the design of data-related privacy controls for smart home devices}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {368--384}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0173}, doi = {10.1108/ICS-11-2022-0173}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ChhetriM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChowdhuryAT23, author = {Noman H. Chowdhury and Marc T. P. Adam and Timm Teubner}, title = {Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {504--526}, year = {2023}, url = {https://doi.org/10.1108/ICS-01-2021-0013}, doi = {10.1108/ICS-01-2021-0013}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ChowdhuryAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ChuaKW23, author = {Hui Na Chua and Vi Vien Khor and Siew Fan Wong}, title = {Examining the effect of different knowledge aspects on information security awareness}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {427--448}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0183}, doi = {10.1108/ICS-11-2022-0183}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ChuaKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ClarkeF23, author = {Nathan L. Clarke and Steven Furnell}, title = {Editorial: Human aspects of cyber security}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {265--266}, year = {2023}, url = {https://doi.org/10.1108/ICS-07-2023-213}, doi = {10.1108/ICS-07-2023-213}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ClarkeF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DouhaRTK23, author = {N'guessan Yves{-}Roland Douha and Karen Renaud and Yuzo Taenaka and Youki Kadobayashi}, title = {Smart home cybersecurity awareness and behavioral incentives}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {545--575}, year = {2023}, url = {https://doi.org/10.1108/ICS-03-2023-0032}, doi = {10.1108/ICS-03-2023-0032}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/DouhaRTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ebot23, author = {Alain Tambe Ebot}, title = {Advance fee fraud scammers' criminal expertise and deceptive strategies: a qualitative case study}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {478--503}, year = {2023}, url = {https://doi.org/10.1108/ICS-01-2022-0007}, doi = {10.1108/ICS-01-2022-0007}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Ebot23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FordAGD23, author = {Adrian Ford and Ameer Al{-}Nemrat and Seyed Ali Ghorashi and Julia Claire Davidson}, title = {The impact of {GDPR} infringement fines on the market value of firms}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {51--64}, year = {2023}, url = {https://doi.org/10.1108/ICS-03-2022-0049}, doi = {10.1108/ICS-03-2022-0049}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FordAGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FortinH23, author = {Anne Fortin and Sylvie H{\'{e}}roux}, title = {Limited usefulness of firm-provided cybersecurity information in institutional investors' investment analysis}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {108--123}, year = {2023}, url = {https://doi.org/10.1108/ICS-07-2022-0122}, doi = {10.1108/ICS-07-2022-0122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FortinH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GafniL23, author = {Ruti Gafni and Yair Levy}, title = {Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {601--623}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2023-0083}, doi = {10.1108/ICS-05-2023-0083}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/GafniL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GlasVRBP23, author = {Magdalena Glas and Manfred Vielberth and Tobias Reittinger and Fabian B{\"{o}}hm and G{\"{u}}nther Pernul}, title = {Improving cybersecurity skill development through visual programming}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {316--330}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0170}, doi = {10.1108/ICS-11-2022-0170}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GlasVRBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GyllenstenTP23, author = {Kristina Gyllensten and Marianne T{\"{o}}rner and Anders Pousette}, title = {The impact of psychosocial working conditions on information security behaviour in the nuclear industry}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {32--50}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2022-0089}, doi = {10.1108/ICS-05-2022-0089}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GyllenstenTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/H23, author = {Haritha P. H.}, title = {Mobile payment service adoption: understanding customers for an application of emerging financial technology}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {145--171}, year = {2023}, url = {https://doi.org/10.1108/ICS-04-2022-0058}, doi = {10.1108/ICS-04-2022-0058}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/H23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KannelonningK23, author = {Kristian Kannel{\o}nning and Sokratis K. Katsikas}, title = {A systematic literature review of how cybersecurity-related behavior has been assessed}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {463--477}, year = {2023}, url = {https://doi.org/10.1108/ICS-08-2022-0139}, doi = {10.1108/ICS-08-2022-0139}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/KannelonningK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/LindqvistK23, author = {Gunnar Lindqvist and Joakim K{\"{a}}vrestad}, title = {How privacy concerns impact Swedish citizens' willingness to report crimes: a quantitative mobile phone survey}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {304--315}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0167}, doi = {10.1108/ICS-10-2022-0167}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/LindqvistK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MathieuT23, author = {Richard G. Mathieu and Alan E. Turovlin}, title = {Lost in the middle - a pragmatic approach for {ERP} managers to prioritize known vulnerabilities by applying classification and regression trees {(CART)}}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {655--674}, year = {2023}, url = {https://doi.org/10.1108/ICS-02-2023-0027}, doi = {10.1108/ICS-02-2023-0027}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/MathieuT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Mujeye23, author = {Stephen Mujeye}, title = {An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {624--634}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2023-0086}, doi = {10.1108/ICS-05-2023-0086}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/Mujeye23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PalanisamyS23, author = {Ramaraj Palanisamy and Yi Shi}, title = {Users' attitude on perceived security of mobile cloud computing: empirical evidence from {SME} users in China}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {65--87}, year = {2023}, url = {https://doi.org/10.1108/ICS-03-2022-0048}, doi = {10.1108/ICS-03-2022-0048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PalanisamyS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/PharrisP23, author = {Lily Pharris and Begona Perez{-}Mira}, title = {Preventing social engineering: a phenomenological inquiry}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {1--31}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2021-0137}, doi = {10.1108/ICS-09-2021-0137}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/PharrisP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RiemenschneiderBB23, author = {Cynthia K. Riemenschneider and Laurie L. Burney and Saman Bina}, title = {The influence of organizational values on employee attitude and information security behavior: the mediating role of psychological capital}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {172--198}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0156}, doi = {10.1108/ICS-10-2022-0156}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RiemenschneiderBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/RostamiKG23, author = {Elham Rostami and Fredrik Karlsson and Shang Gao}, title = {Policy components - a conceptual model for modularizing and tailoring of information security policies}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {331--352}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2022-0160}, doi = {10.1108/ICS-10-2022-0160}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/RostamiKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShahA23, author = {Pintu Shah and Anuja Agarwal}, title = {Cyber Suraksha: a card game for smartphone security awareness}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {576--600}, year = {2023}, url = {https://doi.org/10.1108/ICS-05-2022-0087}, doi = {10.1108/ICS-05-2022-0087}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ShahA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShaheenZ23, author = {Khalid Shaheen and Ali Hussein Zolait}, title = {The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {5}, pages = {529--544}, year = {2023}, url = {https://doi.org/10.1108/ICS-06-2022-0108}, doi = {10.1108/ICS-06-2022-0108}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ShaheenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShanleyJSC23, author = {Aleatha Shanley and Mike Johnstone and Patryk Szewczyk and Michael Crowley}, title = {An exploration of Australian attitudes towards privacy}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {353--367}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0171}, doi = {10.1108/ICS-11-2022-0171}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShanleyJSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ShojaifarF23, author = {Alireza Shojaifar and Samuel A. Fricker}, title = {Design and evaluation of a self-paced cybersecurity tool}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {244--262}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2021-0145}, doi = {10.1108/ICS-09-2021-0145}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ShojaifarF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SmithSBB23, author = {Katherine Taken Smith and Lawrence Murphy Smith and Marcus Burger and Erik S. Boyle}, title = {Cyber terrorism cases and stock market valuation effects}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {4}, pages = {385--403}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2022-0147}, doi = {10.1108/ICS-09-2022-0147}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SmithSBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TariqMATM23, author = {Aamna Tariq and Jawad Manzoor and Muhammad Ammar Aziz and Zain Ul Abideen Tariq and Ammar Masood}, title = {Open source {SIEM} solutions for an enterprise}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {1}, pages = {88--107}, year = {2023}, url = {https://doi.org/10.1108/ICS-09-2021-0146}, doi = {10.1108/ICS-09-2021-0146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TariqMATM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TegethoffSDC23, author = {Thomas M. Tegethoff and Ricardo Santa and Glaucya Da{\'{u}} and Jimy Cortes}, title = {Online security in e-government as an antecedent of cost-effectiveness and quality in business operations}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {125--144}, year = {2023}, url = {https://doi.org/10.1108/ICS-10-2021-0159}, doi = {10.1108/ICS-10-2021-0159}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TegethoffSDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Veiga23, author = {Ad{\'{e}}le da Veiga}, title = {A model for information security culture with creativity and innovation as enablers - refined with an expert panel}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {3}, pages = {281--303}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2022-0178}, doi = {10.1108/ICS-11-2022-0178}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Veiga23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/XuR23, author = {Tianhao Xu and Prashanth Rajivan}, title = {Determining psycholinguistic features of deception in phishing messages}, journal = {Inf. Comput. Secur.}, volume = {31}, number = {2}, pages = {199--220}, year = {2023}, url = {https://doi.org/10.1108/ICS-11-2021-0185}, doi = {10.1108/ICS-11-2021-0185}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/XuR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.