• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719626)   Today's Articles (1045)
For: Stewart H, Jürjens J. Information security management and the human aspect in organizations. ICS 2017. [DOI: 10.1108/ics-07-2016-0054] [Citation(s) in RCA: 31] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Number Cited by Other Article(s)
1
Hore K, Hoi Tan M, Kehoe A, Beegan A, Mason S, Al Mane N, Hughes D, Kelly C, Wells J, Magner C. Cybersecurity and critical care staff: A mixed methods study. Int J Med Inform 2024;185:105412. [PMID: 38492407 DOI: 10.1016/j.ijmedinf.2024.105412] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/04/2023] [Revised: 02/19/2024] [Accepted: 03/11/2024] [Indexed: 03/18/2024]
2
Stewart H. Digital Transformation Security Challenges. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2115953] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
3
Investigation into Phishing Risk Behaviour among Healthcare Staff. INFORMATION 2022. [DOI: 10.3390/info13080392] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
4
Stewart H. The hindrance of cloud computing acceptance within the financial sectors in Germany. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-01-2021-0002] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/17/2022]
5
Amankwa E, Loock M, Kritzinger E. The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-10-2021-0169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
6
A systematic framework to explore the determinants of information security policy development and outcomes. INFORMATION AND COMPUTER SECURITY 2022. [DOI: 10.1108/ics-06-2021-0076] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
7
Al-Harrasi A, Shaikh AK, Al-Badi A. Towards protecting organisations’ data by preventing data theft by malicious insiders. INTERNATIONAL JOURNAL OF ORGANIZATIONAL ANALYSIS 2021. [DOI: 10.1108/ijoa-01-2021-2598] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
The impact of information security initiatives on supply chain robustness and performance: an empirical study. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-07-2020-0128] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
9
An interdisciplinary view of social engineering: A call to action for research. COMPUTERS IN HUMAN BEHAVIOR REPORTS 2021. [DOI: 10.1016/j.chbr.2021.100126] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]  Open
10
Khatib R, Barki H. An activity theory approach to information security non-compliance. INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-11-2018-0128] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
Schinagl S, Shahim A. What do we know about information security governance? INFORMATION AND COMPUTER SECURITY 2020. [DOI: 10.1108/ics-02-2019-0033] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
12
Evans MG, He Y, Yevseyeva I, Janicke H. Published incidents and their proportions of human error. INFORMATION AND COMPUTER SECURITY 2019. [DOI: 10.1108/ics-12-2018-0147] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA