About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Information and Computer Security
›
top-articles
Information and Computer Security
1.4
(top 50%)
impact factor
296
(top 50%)
papers
2.9K
(top 20%)
citations
25
(top 20%)
h
-index
1.5
(top 50%)
impact factor
347
all documents
3.2K
doc citations
36
(top 20%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Data security and consumer trust in FinTech innovation in Germany
Information and Computer Security
2018
131
2
The sufficiency of the theory of planned behavior for explaining information security policy compliance
Information and Computer Security
2015
71
3
Cybersecurity and information security – what goes where?
Information and Computer Security
2018
70
4
Online privacy and security concerns of consumers
Information and Computer Security
2016
58
5
Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)
Information and Computer Security
2019
50
6
Information security culture – state-of-the-art review between 2000 and 2013
Information and Computer Security
2015
49
7
Comparing the information security culture of employees who had read the information security policy and those who had not
Information and Computer Security
2016
49
8
Security behaviors of smartphone users
Information and Computer Security
2016
48
9
Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective
Information and Computer Security
2021
41
10
Information security management and the human aspect in organizations
Information and Computer Security
2017
40
11
Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks
Information and Computer Security
2016
39
12
Organisational culture, procedural countermeasures, and employee security behaviour
Information and Computer Security
2017
36
13
A survey on the Internet of Things security
Information and Computer Security
2019
36
14
Socio-technical systems cybersecurity framework
Information and Computer Security
2019
36
15
Investigating personal determinants of phishing and the effect of national culture
Information and Computer Security
2015
32
16
The impact of repeated data breach events on organisations’ market value
Information and Computer Security
2016
32
17
Comparing three models to explain precautionary online behavioural intentions
Information and Computer Security
2017
32
18
Spear phishing in organisations explained
Information and Computer Security
2017
32
19
Factors in an end user security expertise instrument
Information and Computer Security
2017
32
20
Information security policy compliance: a higher education case study
Information and Computer Security
2018
32
21
Identifying and predicting the factors affecting end-users’ risk-taking behavior
Information and Computer Security
2018
30
22
A process model for implementing information systems security governance
Information and Computer Security
2018
29
23
A study on usability and security features of the Android pattern lock screen
Information and Computer Security
2016
27
24
Mobile device users’ privacy security assurance behavior
Information and Computer Security
2017
27
25
A review of security assessment methodologies in industrial control systems
Information and Computer Security
2019
27
26
Social engineering defence mechanisms and counteracting training strategies
Information and Computer Security
2017
26
27
Establishing information security policy compliance culture in organizations
Information and Computer Security
2018
26
28
The effect of resilience and job stress on information security awareness
Information and Computer Security
2018
25
29
Reengineering the user: privacy concerns about personal data on smartphones
Information and Computer Security
2015
24
30
An information security risk-driven investment model for analysing human factors
Information and Computer Security
2016
24
31
Understanding of e-service security dimensions and its effect on quality and intention to use
Information and Computer Security
2017
24
32
Deterrence and punishment experience impacts on ISP compliance attitudes
Information and Computer Security
2017
24
33
Cybersecurity behaviour of smartphone users in India: an empirical analysis
Information and Computer Security
2020
24
34
Information and cyber security maturity models: a systematic literature review
Information and Computer Security
2020
24
35
Strategic value alignment for information security management: a critical success factor analysis
Information and Computer Security
2018
23
36
Assessing information security attitudes: a comparison of two studies
Information and Computer Security
2016
21
37
The role of the chief information security officer in the management of IT security
Information and Computer Security
2017
21
38
Measuring employees’ compliance – the importance of value pluralism
Information and Computer Security
2017
21
39
A systematic approach to investigating how information security and privacy can be achieved in BYOD environments
Information and Computer Security
2017
21
40
Persuading end users to act cautiously online: a fear appeals study on phishing
Information and Computer Security
2018
21
41
Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills
Information and Computer Security
2019
21
42
Ontology-based information security compliance determination and control selection on the example of ISO 27002
Information and Computer Security
2018
20
43
Impact of cyberattacks on stock performance: a comparative study
Information and Computer Security
2018
20
44
Key elements of an information security culture in organisations
Information and Computer Security
2019
20
45
What do we know about information security governance?
Information and Computer Security
2020
20
46
Security evaluation of the OAuth 2.0 framework
Information and Computer Security
2015
18
47
Organizational objectives for information security governance: a value focused assessment
Information and Computer Security
2015
18
48
An empirical test of the accuracy of an attack graph analysis tool
Information and Computer Security
2015
18
49
Evaluating the effect of multi-touch behaviours on Android unlock patterns
Information and Computer Security
2016
18
50
Human-centered authentication guidelines
Information and Computer Security
2017
18
site/software ©
exaly
; All materials licenced under
CC by-SA
.