← All journals

Information and Computer Security

Emerald

AJG 1ABDC B
Abstract coveragesee Methodology
Recent paperssorted by most recent
PaperYearCitations
What skills do cybersecurity professionals need?
Faheem Ullah et al.
20261 citations
Industry sector matters: mapping industry-specific cyber vulnerabilities through rational choice theory analysis
Sandeep Suntwal et al.
20260 citations
Phishing for proficiency: evaluating proficiency-based categorisation for personalised phishing training
Lorin Schöni et al.
20260 citations
The vigilance paradox: automation reliance inside the modern SOC
Jack Tilbury & Stephen Flowerday
20260 citations
Artificial intelligence in information security policy management research: a scoping review
Fredrik Karlsson et al.
20260 citations
Evaluating cyber resilience frameworks for e-government: applicability of NIST CSF, ISO/IEC 27001 and COBIT 2019 in developing country contexts
Thifhindulwi Maxwell Rambau et al.
20260 citations
Responsible AI governance, privacy concerns and the adoption of financial AI: an extension of UTAUT2 and communication privacy management
Longfei Zhang et al.
20260 citations
The importance of records in information classification – “if you have not documented it, you have not done it”
Simon Andersson & Erik Bergström
20260 citations
Cyber risk management among tax and customs officials: the pilot study in Estonia
Kate‐Riin Kont & Denis Horenženko
20260 citations
Case study: the impact of an organization’s security level on user experience
Radek Švadlenka
20260 citations
Everyday tracking and extraordinary harm: item finder misuse in digital coercive control
Vivian Hocking et al.
20260 citations
Impact of corporate governance on bank performance in the MENA region: the moderating role of cybersecurity policy
Munther Al‐Nimer et al.
20260 citations
When words lose their edge: a comparative analysis of information security policy keywords in the UK and Sweden
Alexander Wedlund et al.
20260 citations
Innovation resistance and usage intention of virtual assistants. The moderating role of privacy concerns
Carmen Pérez Cabañero et al.
20260 citations
Toward a human-centric view of NCIIPC guidelines for enabling its adoption in Indian critical information infrastructures
Vivek Kant et al.
20260 citations
A systematic literature review on the adoption and effectiveness of cybersecurity frameworks in higher education institutions
Shamsuddeen Umaru Adamu et al.
20260 citations
Multi-criteria analysis of cybersecurity maturity in the largest Latin American economies using CRITIC-WISP
Erik Etsushi Miyashita & Luis Hernan Contreras Pinochet
20260 citations
Privacy pitfalls: challenges in FemTech app adoption
Shreya Mukherjee et al.
20260 citations
Sharing passwords with strangers – A laboratory study
Anna Lena Fehlhaber
20260 citations
Bridging the digital gap: security, privacy and challenges for older adults in governmental digital services
Dave Brown et al.
20260 citations

Search evidence from this journal →

Start a search

Access requires your institution's subscription. Ask your librarian →