Information and Computer Security

短名Inf. Comput. Secur.
Journal Impact1.57
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3)
ISSN2056-4961, 2056-497X
h-index57

Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. It publishes research and case study papers relating to new technologies, methodological developments, empirical studies and practical applications. The journal welcomes papers addressing research and case studies in relation to many aspects of information and computer security. Topics of interest include, but are not limited to, the following: Information security management, standards and policies Security governance and compliance Risk assessment and modelling Security awareness, education and culture User perceptions and understanding of security Misuse and abuse of computer systems User-facing security technologies Internet security and privacy The journal is particularly interested in receiving submissions that consider the business and organisational aspects of security, and welcomes papers from both human and technical perspective on the topic. However, please note we do not look to solicit papers relating to the underlying mechanisms and functions of security methods such as cryptography (although relevant applications of the technology may be considered).

涉及主题计算机科学政治学法学计算机安全心理学操作系统社会学社会科学社会心理学业务人类学数学定性研究经济创造力独创性工程类统计生物哲学程序设计语言知识管理信息安全机器学习地理互联网隐私医学物理管理历史万维网考古认识论云计算人工智能
出版信息出版商: Emerald Group Publishing Ltd.出版周期: 期刊类型: journal
基本数据创刊年份: 2015原创研究文献占比96.00%自引率:18.80%Gold OA占比: 10.17%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Large-scale agile security practices in software engineering

2024-9-11

How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?

2024-9-11

A collaborative cybersecurity framework for higher education

2024-9-10

Validating and extending the unified model of information security policy compliance

2024-9-3

The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks

2024-8-26

Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace

2024-8-16

Understanding information security awareness: evidence from the public healthcare sector

2024-8-12

The effects of persuasion principles on perceived honesty during shoulder surfing attacks

2024-8-6

Understanding the factors that motivate South African home fibre users to protect their home networking devices: a protection motivation theory

2024-7-29

Expressing opinions about information security in an organization: the spiral of silence theory perspective

2024-7-23

Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity

2024-7-17

Unraveling the dynamics of password manager adoption: a deeper dive into critical factors

2024-7-15

Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches

2024-7-15

Trends and challenges in research into the human aspects of ransomware: a systematic mapping study

2024-7-3

The role of artificial intelligence (AI) in improving technical and managerial cybersecurity tasks’ efficiency

2024-6-28

Factors that influence secure behaviour while using mobile digital devices

2024-6-28

Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review

2024-6-21

Cybersecurity in digital supply chains in the procurement process: introducing the digital supply chain management framework

2024-6-20

A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)

2024-6-20

Regulating digital security by design? Implications of the perspectives from DSbD programme stakeholders

2024-6-18

Optimism bias in susceptibility to phishing attacks: an empirical study

2024-5-24

Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam

2024-4-30

What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items

2024-4-26

Mining Reddit users’ perspectives on cybersecurity competitions: a mixed method approach

2024-4-23

Qualitative content analysis of actionable advice in information security policies – introducing the keyword loss of specificity metric

2024-4-17

Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours

2024-4-17

Bridging knowledge gap: the contribution of employees’ awareness of AI cyber risks comprehensive program to reducing emerging AI digital threats

2024-4-16

The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals

2024-4-4

Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic

2024-4-3

Human factors in remote work: examining cyber hygiene practices

2024-4-1

Investigation on information security awareness based on KAB model: the moderating role of age and education level

2024-3-20

An assessment of critical success factors in information security implementation in organizations in Ghana

2024-3-1

Cybersecurity in modern cars: awareness and readiness of auto workshops

2024-2-1

Getting users to click: a content analysis of phishers’ tactics and techniques in mobile instant messaging phishing

2024-1-29

Exploring the critical success factors of information security management: a mixed-method approach

2024-1-23

Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure

2024-1-15

Detecting deception in computer-mediated communication: the role of popularity information across media types

2024-1-10

Human factors and cyber-security risks on the railway – the critical role played by signalling operations

2024-1-2

An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour

2024-1-1

Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach

2023-12-1

Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention

2023-11-27

European Artificial Intelligence Act: an AI security approach

2023-11-23

“…I have my dad, sister, brother, and mom’s password”: unveiling users’ mental models of security and privacy-preserving tools

2023-11-20

Informational inequality: the role of resources and attributes in information security awareness

2023-11-9

Organizational perspectives on converged security operations

2023-10-30

Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics

2023-10-16

Determining cybersecurity culture maturity and deriving verifiable improvement measures

2023-10-5

Exploring the role of assurance context in system security assurance evaluation: a conceptual model

2023-10-3

Lost in the middle – a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART)

2023-9-13

Framework for critical information infrastructure protection in smart government: a case study in Indonesia

2023-9-11

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司