All Stories

  1. Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
  2. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
  3. Managing the introduction of information security awareness programmes in organisations
  4. Directions for Raising Privacy Awareness in SNS Platforms
  5. A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model
  6. A Classification of Factors Influencing Low Adoption of PETs Among SNS Users
  7. An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions
  8. Analyzing trajectories of information security awareness
  9. Analyzing Information Security Awareness through Networks of Association
  10. Privacy and fair information practices in ubiquitous environments
  11. Investigating Information Security Awareness: Research and Practice Gaps
  12. Process‐variance models in information security awareness research
  13. Privacy Perceptions among Members of Online Communities
  14. Internet Forensics: Legal and Technical Issues
  15. A framework for outsourcing IS/IT security services
  16. Employees’ privacy vs. employers’ security: Can they be balanced?
  17. Formulating information systems risk management strategies through cultural theory
  18. A Framework for Exploiting Security Expertise in Application Development
  19. The insider threat to information systems and the effectiveness of ISO17799
  20. Information systems security policies: a contextual perspective
  21. Content, Context, Process Analysis of is Security Policy Formation
  22. Secure Electronic Voting: the Current Landscape
  23. Elaborating Quantitative Approaches for IT Security Evaluation
  24. Redefining Information Systems Security: Viable Information Systems
  25. The Socioeconomic Background of Electronic Crime
  26. Bridging the Gap between Employee Surveillance and Privacy Protection
  27. Using the Lens of Circuits of Power in Information Systems Security Management
  28. A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptions