1. Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs). (8th July 2019) Authors: Bada, Maria; Nurse, Jason R.C. Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 393 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Revisiting information security risk management challenges: a practice perspective. (8th July 2019) Authors: Bergström, Erik; Lundgren, Martin; Ericson, Åsa Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 358 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Security gaps assessment of smart grid based SCADA systems. (8th July 2019) Authors: Mir, Abdul Wahid; Ketti Ramachandran, Ramkumar Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 434 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Understanding passwords – a taxonomy of password creation strategies. (8th July 2019) Authors: Kävrestad, Joakim; Eriksson, Fredrik; Nohlberg, Marcus Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 453 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Contrasting cybersecurity implementation frameworks (CIF) from three countries. (8th July 2019) Authors: Dedeke, Adenekan; Masterson, Katherine Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 373 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. A conceptual model and empirical assessment of HR security risk management. (8th July 2019) Authors: Kumah, Peace; Yaokumah, Winfred; Okai, Eric Saviour Aryee Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 411 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Information protection behaviors: morality and organizational criticality. (8th July 2019) Authors: Lankton, Nancy K.; Stivason, Charles; Gurung, Anil Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 468 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Published incidents and their proportions of human error. (8th July 2019) Authors: Evans, Mark Glenn; He, Ying; Yevseyeva, Iryna; Janicke, Helge Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 343 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. From theory to practice: guidelines for enhancing information security management. (8th July 2019) Authors: Topa, Ioanna; Karyda, Maria Journal: Information and computer security Issue: Volume 27:Number 3(2019) Page Start: 326 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the UK and China. (9th March 2015) Authors: Sun, Yan; Davidson, Ian Journal: Information and computer security Issue: Volume 23:Number 1(2015) Page Start: 3 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗