EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"Information & Computer Security"
Narrow search

Narrow search

Year of publication
Subject
All
Information security 44 Security 24 Cybersecurity 19 Privacy 17 Computer security 13 Risk management 10 Information security policy 7 Phishing 7 Cyber security 6 Information security culture 6 Risk 6 Usability 6 Compliance 5 Computer privacy 5 Framework 5 Training 5 Usable security 5 Access control 4 Computer users 4 Content analysis 4 Cybersecurity awareness 4 Education 4 GDPR 4 Information security awareness 4 Organisational culture 4 Protection motivation theory 4 Social engineering 4 Vulnerability 4 Authentication 3 Cloud computing 3 Culture 3 Cybersecurity maturity 3 Data protection 3 Data security 3 Information management 3 Information security management 3 Information security modeling 3 Information systems 3 Innovation 3 Literature review 3
more ... less ...
Online availability
All
Undetermined 300 Free 18 CC license 16
Type of publication
All
Article 318
Type of publication (narrower categories)
All
research-article 183 review 9 back-matter 7 conceptual-paper 7 case-report 4 technical-paper 2 review-article 1 viewpoint 1
more ... less ...
Language
All
English 318
Author
All
Karlsson, Fredrik 9 Clarke, Nathan 8 Karyda, Maria 8 Renaud, Karen 8 Nohlberg, Marcus 6 Tsohou, Aggeliki 6 Butavicius, Marcus 5 Furnell, Steven 5 Kokolakis, Spyros 5 Kävrestad, Joakim 5 Mouratidis, Haralambos 5 Al-Ameen, Mahdi Nasrullah 4 Da Veiga, Adéle 4 Faily, Shamal 4 Gafni, Ruti 4 Kolkowska, Ella 4 Pattinson, Malcolm 4 Sommestad, Teodor 4 Butler, Rika 3 Calic, Dragana 3 Camp, L. Jean 3 Chen, Hao 3 Diamantopoulou, Vasiliki 3 Flowerday, Stephen 3 Furnell, Steven M. 3 Karlsson, Martin 3 Katos, Vasilios 3 Levy, Yair 3 McCormac, Agata 3 Mitrou, Lilian 3 Ophoff, Jacques 3 Papadaki, Maria 3 Parsons, Kathryn 3 Rostami, Elham 3 Skalkos, Andreas 3 Stewart, Harrison 3 Stylios, Ioannis 3 Törner, Marianne 3 Volkamer, Melanie 3 von Solms, Rossouw 3
more ... less ...
Published in...
All
Information & Computer Security 318
Source
All
Other ZBW resources 318
Showing 1 - 10 of 318
Cover Image
Optimism bias in susceptibility to phishing attacks: an empirical study
Owen, Morné; Flowerday, Stephen V.; van der Schyff, Karl - In: Information & Computer Security 32 (2024) 5, pp. 656-675
Purpose Researchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this paper is to understand the role of optimism bias (OB – defined as a cognitive bias), which characterises...
Persistent link: https://www.econbiz.de/10015344449
Saved in:
Cover Image
Factors that influence secure behaviour while using mobile digital devices
Spruit, Marcel; Oosting, Deborah; Kreffer, Céline - In: Information & Computer Security 32 (2024) 5, pp. 729-747
Purpose The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The purpose of this study is to establish a model for measuring secure behaviour, and to use this model to measure...
Persistent link: https://www.econbiz.de/10015344450
Saved in:
Cover Image
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Stavrou, Eliana; Piki, Andriani - In: Information & Computer Security 32 (2024) 4, pp. 523-541
Purpose The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challenges, the multidisciplinary, everchanging and complex nature of the cybersecurity domain has further challenged the...
Persistent link: https://www.econbiz.de/10015344451
Saved in:
Cover Image
Human factors and cyber-security risks on the railway – the critical role played by signalling operations
Thron, Eylem; Faily, Shamal; Dogan, Huseyin; Freer, Martin - In: Information & Computer Security 32 (2024) 2, pp. 236-263
Purpose Railways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at the core. The technological evolution including interconnectedness and new ways of interaction lead to new...
Persistent link: https://www.econbiz.de/10015344461
Saved in:
Cover Image
Qualitative content analysis of actionable advice in information security policies – introducing the keyword loss of specificity metric
Rostami, Elham; Karlsson, Fredrik - In: Information & Computer Security 32 (2024) 4, pp. 492-508
Purpose This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs. Design/methodology/approach A qualitative content analysis of 15...
Persistent link: https://www.econbiz.de/10015344473
Saved in:
Cover Image
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks
Whitty, Monica Therese; Ruddy, Christopher; Keatley, David - In: Information & Computer Security 32 (2024) 4, pp. 509-522
Purpose Intellectual property (IP) theft is an increasing threat that can lead to large financial losses and reputational harm. These attacks are typically noticed only after the IP is stolen, which is usually too late. This paper aims to investigate the psychological profile and the...
Persistent link: https://www.econbiz.de/10015344478
Saved in:
Cover Image
Cybersecurity in modern cars: awareness and readiness of auto workshops
Hedberg, David; Lundgren, Martin; Nohlberg, Marcus - In: Information & Computer Security 32 (2024) 4, pp. 407-419
Purpose This study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice. Design/methodology/approach This study is based on an empirical study consisting of semistructured...
Persistent link: https://www.econbiz.de/10015344479
Saved in:
Cover Image
What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
Gerdin, Marcus; Kolkowska, Ella; Grönlund, Åke - In: Information & Computer Security 32 (2024) 4, pp. 459-476
Purpose Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by...
Persistent link: https://www.econbiz.de/10015344482
Saved in:
Cover Image
A systematic literature review of how cybersecurity-related behavior has been assessed
Kannelønning, Kristian; Katsikas, Sokratis K. - In: Information & Computer Security 31 (2023) 4, pp. 463-477
Purpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown...
Persistent link: https://www.econbiz.de/10014754824
Saved in:
Cover Image
Policy components – a conceptual model for modularizing and tailoring of information security policies
Rostami, Elham; Karlsson, Fredrik; Gao, Shang - In: Information & Computer Security 31 (2023) 3, pp. 331-352
Purpose This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs). Design/methodology/approach This study used a design science research approach, drawing on design knowledge from the field of...
Persistent link: https://www.econbiz.de/10014754864
Saved in:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...