Information and Computer Security
短名 | Inf. Comput. Secur. |
Journal Impact | 1.57 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3) |
ISSN | 2056-4961, 2056-497X |
h-index | 57 |
Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new technologies, methodological developments, empirical studies and practical applications. The journal welcomes papers addressing research and case studies in relation to many aspects of information and computer security. Topics of interest include, but are not limited to, the following: Information security management, standards and policies Security governance and compliance Risk assessment and modelling Security awareness, education and culture User perceptions and understanding of security Misuse and abuse of computer systems User-facing security technologies Internet security and privacy The journal is particularly interested in receiving submissions that consider the business and organisational aspects of security, and welcomes papers from both human and technical perspective on the topic. However, please note we do not look to solicit papers relating to the underlying mechanisms and functions of security methods such as cryptography (although relevant applications of the technology may be considered).
涉及主题 | 计算机科学政治学法学计算机安全心理学操作系统社会学社会科学社会心理学业务人类学数学定性研究经济创造力独创性工程类统计生物哲学程序设计语言知识管理信息安全机器学习地理互联网隐私医学物理管理历史万维网考古认识论云计算人工智能 |
出版信息 | 出版商: Emerald Group Publishing Ltd.,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2015,原创研究文献占比: 96.00%,自引率:18.80%, Gold OA占比: 10.17% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Large-scale agile security practices in software engineering
2024-9-11
How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?
2024-9-11
A collaborative cybersecurity framework for higher education
2024-9-10
Validating and extending the unified model of information security policy compliance
2024-9-3
The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks
2024-8-26
Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace
2024-8-16
Understanding information security awareness: evidence from the public healthcare sector
2024-8-12
The effects of persuasion principles on perceived honesty during shoulder surfing attacks
2024-8-6
Understanding the factors that motivate South African home fibre users to protect their home networking devices: a protection motivation theory
2024-7-29
Expressing opinions about information security in an organization: the spiral of silence theory perspective
2024-7-23
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
2024-7-17
Unraveling the dynamics of password manager adoption: a deeper dive into critical factors
2024-7-15
Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches
2024-7-15
Trends and challenges in research into the human aspects of ransomware: a systematic mapping study
2024-7-3
The role of artificial intelligence (AI) in improving technical and managerial cybersecurity tasks’ efficiency
2024-6-28
Factors that influence secure behaviour while using mobile digital devices
2024-6-28
Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review
2024-6-21
Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework
2024-6-20
A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)
2024-6-20
Regulating digital security by design? Implications of the perspectives from DSbD programme stakeholders
2024-6-18
Optimism bias in susceptibility to phishing attacks: an empirical study
2024-5-24
Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam
2024-4-30
What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
2024-4-26
Mining Reddit users’ perspectives on cybersecurity competitions: a mixed method approach
2024-4-23
Qualitative content analysis of actionable advice in information security policies – introducing the keyword loss of specificity metric
2024-4-17
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
2024-4-17
Bridging knowledge gap: the contribution of employees’ awareness of AI cyber risks comprehensive program to reducing emerging AI digital threats
2024-4-12
The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals
2024-4-4
Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic
2024-4-3
Human factors in remote work: examining cyber hygiene practices
2024-4-1
Investigation on information security awareness based on KAB model: the moderating role of age and education level
2024-3-20
An assessment of critical success factors in information security implementation in organizations in Ghana
2024-3-1
Cybersecurity in modern cars: awareness and readiness of auto workshops
2024-2-1
Getting users to click: a content analysis of phishers’ tactics and techniques in mobile instant messaging phishing
2024-1-29
Exploring the critical success factors of information security management: a mixed-method approach
2024-1-23
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure
2024-1-15
Detecting deception in computer-mediated communication: the role of popularity information across media types
2024-1-10
Human factors and cyber-security risks on the railway – the critical role played by signalling operations
2024-1-2
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour
2024-1-1
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
2023-12-1
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention
2023-11-27
European Artificial Intelligence Act: an AI security approach
2023-11-21
“…I have my dad, sister, brother, and mom’s password”: unveiling users’ mental models of security and privacy-preserving tools
2023-11-20
Informational inequality: the role of resources and attributes in information security awareness
2023-11-7
Organizational perspectives on converged security operations
2023-10-30
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics
2023-10-16
Determining cybersecurity culture maturity and deriving verifiable improvement measures
2023-10-5
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
2023-10-3
Lost in the middle – a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART)
2023-9-13
Framework for critical information infrastructure protection in smart government: a case study in Indonesia
2023-9-11
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远