//--> //--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Academic Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: isPartOf:"Information and Computer Security"
Narrow search
Narrow search
Year of publication
From:
To:
Online availability
All
Undetermined
38
Type of publication
All
Article
38
Language
All
English
38
Author
All
Clarke, Nathan
2
Da Veiga, Adéle
2
Dhillon, Gurpreet
2
Furnell, Steven
2
Karlsson, Martin
2
Abdelhamid, Mohamed
1
Agrawal, Vinayak
1
Ahmad, Zauwiyah
1
Alghasham, Noorah
1
Alkhudhayr, Fatimah
1
Almushyti, Muna
1
Alohali, Manal
1
Alotaibi, Mutlaq Jalimid
1
Alshare, Khaled A.
1
Alsuhibany, Suliman A.
1
Alzamil, Zakarya A.
1
Anand, Rashmi
1
Arachchilage, Nalin Asanka Gamagedara
1
Archer, Norm
1
Ashenden, Debi
1
Atsu, Francis
1
Aurigemma, Salvatore
1
Baltatzis, Dimitrios
1
Banwet, D.K.
1
Benbasat, Izak
1
Berndtsson, Joakim
1
Buchanan, William
1
Butavicius, Marcus
1
Calic, Dragana
1
Carlton, Melissa
1
Cavusoglu, Hasan
1
Connelly, Catherine E.
1
Coss, David Lewis
1
Daud, Maslina
1
Denk, Thomas
1
Drevin, Lynette
1
Fenz, Stefan
1
Haftor, Darek
1
Hedström, Karin
1
Ilioudis, Christos
1
more ...
less ...
Published in...
All
Information and Computer Security
38
Source
All
Other ZBW resources
38
Showing
11
-
20
of
38
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
11
Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills
Carlton, Melissa
;
Levy, Yair
;
Ramim, Michelle
- In:
Information and Computer Security
27
(
2019
)
1
,
pp. 101-121
Persistent link: https://www.econbiz.de/10012068659
Saved in:
12
Key elements of an information security culture in organisations
Nel, Frans
;
Drevin, Lynette
- In:
Information and Computer Security
27
(
2019
)
2
,
pp. 146-164
Persistent link: https://www.econbiz.de/10012068665
Saved in:
13
A framework for reporting and dealing with end-user security policy compliance
Alotaibi, Mutlaq Jalimid
;
Furnell, Steven
;
Clarke, Nathan
- In:
Information and Computer Security
27
(
2019
)
1
,
pp. 2-25
Persistent link: https://www.econbiz.de/10012068669
Saved in:
14
Information security practice in Saudi Arabia: case study on Saudi organizations
Alzamil, Zakarya A.
- In:
Information and Computer Security
26
(
2018
)
5
,
pp. 568-583
Persistent link: https://www.econbiz.de/10012068603
Saved in:
15
Ontology-based information security compliance determination and control selection on the example of ISO 27002
Fenz, Stefan
;
Neubauer, Thomas
- In:
Information and Computer Security
26
(
2018
)
5
,
pp. 551-567
Persistent link: https://www.econbiz.de/10012068610
Saved in:
16
A utilitarian re-examination of enterprise-scale information security management
Stewart, Andrew
- In:
Information and Computer Security
26
(
2018
)
1
,
pp. 39-57
Persistent link: https://www.econbiz.de/10012068613
Saved in:
17
The effect of resilience and job stress on information security awareness
McCormac, Agata
;
Calic, Dragana
;
Parsons, Kathryn
; …
- In:
Information and Computer Security
26
(
2018
)
3
,
pp. 277-289
Persistent link: https://www.econbiz.de/10012068615
Saved in:
18
Security questions education: exploring gamified features and functionalities
Micallef, Nicholas
;
Arachchilage, Nalin Asanka Gamagedara
- In:
Information and Computer Security
26
(
2018
)
3
,
pp. 365-378
Persistent link: https://www.econbiz.de/10012068616
Saved in:
19
I shall, we shall, and all others will: paradoxical information security behaviour
Snyman, Dirk P.
;
Kruger, Hennie
;
Kearney, Wayne D.
- In:
Information and Computer Security
26
(
2018
)
3
,
pp. 290-305
Persistent link: https://www.econbiz.de/10012068617
Saved in:
20
An information privacy culture instrument to measure consumer privacy expectations and confidence
Da Veiga, Adéle
- In:
Information and Computer Security
26
(
2018
)
3
,
pp. 338-364
Persistent link: https://www.econbiz.de/10012068618
Saved in:
First
Prev
1
2
3
4
Next
Last
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->