1.4(top 50%)
impact factor
296(top 50%)
papers
2.9K(top 20%)
citations
25(top 20%)
h-index
1.5(top 50%)
impact factor
347
all documents
3.2K
doc citations
36(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Data security and consumer trust in FinTech innovation in GermanyInformation and Computer Security2018131
2The sufficiency of the theory of planned behavior for explaining information security policy complianceInformation and Computer Security201571
3Cybersecurity and information security – what goes where?Information and Computer Security201870
4Online privacy and security concerns of consumersInformation and Computer Security201658
5Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)Information and Computer Security201950
6Information security culture – state-of-the-art review between 2000 and 2013Information and Computer Security201549
7Comparing the information security culture of employees who had read the information security policy and those who had notInformation and Computer Security201649
8Security behaviors of smartphone usersInformation and Computer Security201648
9Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspectiveInformation and Computer Security202141
10Information security management and the human aspect in organizationsInformation and Computer Security201740
11Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacksInformation and Computer Security201639
12Organisational culture, procedural countermeasures, and employee security behaviourInformation and Computer Security201736
13A survey on the Internet of Things securityInformation and Computer Security201936
14Socio-technical systems cybersecurity frameworkInformation and Computer Security201936
15Investigating personal determinants of phishing and the effect of national cultureInformation and Computer Security201532
16The impact of repeated data breach events on organisations’ market valueInformation and Computer Security201632
17Comparing three models to explain precautionary online behavioural intentionsInformation and Computer Security201732
18Spear phishing in organisations explainedInformation and Computer Security201732
19Factors in an end user security expertise instrumentInformation and Computer Security201732
20Information security policy compliance: a higher education case studyInformation and Computer Security201832
21Identifying and predicting the factors affecting end-users’ risk-taking behaviorInformation and Computer Security201830
22A process model for implementing information systems security governanceInformation and Computer Security201829
23A study on usability and security features of the Android pattern lock screenInformation and Computer Security201627
24Mobile device users’ privacy security assurance behaviorInformation and Computer Security201727
25A review of security assessment methodologies in industrial control systemsInformation and Computer Security201927
26Social engineering defence mechanisms and counteracting training strategiesInformation and Computer Security201726
27Establishing information security policy compliance culture in organizationsInformation and Computer Security201826
28The effect of resilience and job stress on information security awarenessInformation and Computer Security201825
29Reengineering the user: privacy concerns about personal data on smartphonesInformation and Computer Security201524
30An information security risk-driven investment model for analysing human factorsInformation and Computer Security201624
31Understanding of e-service security dimensions and its effect on quality and intention to useInformation and Computer Security201724
32Deterrence and punishment experience impacts on ISP compliance attitudesInformation and Computer Security201724
33Cybersecurity behaviour of smartphone users in India: an empirical analysisInformation and Computer Security202024
34Information and cyber security maturity models: a systematic literature reviewInformation and Computer Security202024
35Strategic value alignment for information security management: a critical success factor analysisInformation and Computer Security201823
36Assessing information security attitudes: a comparison of two studiesInformation and Computer Security201621
37The role of the chief information security officer in the management of IT securityInformation and Computer Security201721
38Measuring employees’ compliance – the importance of value pluralismInformation and Computer Security201721
39A systematic approach to investigating how information security and privacy can be achieved in BYOD environmentsInformation and Computer Security201721
40Persuading end users to act cautiously online: a fear appeals study on phishingInformation and Computer Security201821
41Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skillsInformation and Computer Security201921
42Ontology-based information security compliance determination and control selection on the example of ISO 27002Information and Computer Security201820
43Impact of cyberattacks on stock performance: a comparative studyInformation and Computer Security201820
44Key elements of an information security culture in organisationsInformation and Computer Security201920
45What do we know about information security governance?Information and Computer Security202020
46Security evaluation of the OAuth 2.0 frameworkInformation and Computer Security201518
47Organizational objectives for information security governance: a value focused assessmentInformation and Computer Security201518
48An empirical test of the accuracy of an attack graph analysis toolInformation and Computer Security201518
49Evaluating the effect of multi-touch behaviours on Android unlock patternsInformation and Computer Security201618
50Human-centered authentication guidelinesInformation and Computer Security201718