All Stories

  1. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon
  2. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
  3. Managing the introduction of information security awareness programmes in organisations
  4. Directions for Raising Privacy Awareness in SNS Platforms
  5. Exploring citizens' intention to use e-government services: the role of cultural bias
  6. Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps
  7. An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions
  8. Analyzing trajectories of information security awareness
  9. A security standards' framework to facilitate best practices' awareness and conformity
  10. Analyzing Information Security Awareness through Networks of Association
  11. Information Systems Security Management: A Review and a Classification of the ISO Standards
  12. Privacy and fair information practices in ubiquitous environments
  13. Security and Dependability for Ambient Intelligence
  14. Introduction: The SERENITY vision
  15. Future Directions
  16. Security and Dependability Solutions for Web Services and Workflows
  17. Investigating Information Security Awareness: Research and Practice Gaps
  18. Process‐variance models in information security awareness research
  19. Privacy Perceptions among Members of Online Communities
  20. Formulating information systems risk management strategies through cultural theory
  21. A Framework for Exploiting Security Expertise in Application Development
  22. The insider threat to information systems and the effectiveness of ISO17799
  23. Information systems security from a knowledge management perspective
  24. Information systems security policies: a contextual perspective
  25. Content, Context, Process Analysis of is Security Policy Formation
  26. Computer Supported Collaboration in the Public Sector: The ICTE-PAN Project
  27. A Knowledge-Based Repository Model for Security Policies Management
  28. Functional Requirements for a Secure Electronic Voting System
  29. Redefining Information Systems Security: Viable Information Systems
  30. Achieving Interoperability in a Multiple-Security- Policies Environment
  31. A Qualitative Approach to Information Availability
  32. Generic security policies for healthcare information systems
  33. Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship