21
Views
0
CrossRef citations to date
0
Altmetric
Guest Editorial

Guest Editorial

&

REFERENCES

  • Alazab, A., Abawajy, J., Hobbs, M., & Khraisat, A. (2013). Crime toolkits: The current threats to web applications. Journal of Information Privacy & Security, 9(2), 21 –39.
  • Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90 –101.
  • Curry, S. (2011). The weakest link is the human link. Retrieved from http://www.securityweek.com/weakest-link-human-link
  • Davinson, N., & Sillence, E. (2010). It won’t happen to me: Promoting secure behaviour among internet users. Computers in Human Behavior, 26(6), 1739 –1747.
  • Harris, M. A., Furnell, S., & Patten, K. (2014). Comparing the mobile device security behavior of college students and information technology professionals. Journal of Information Privacy and Security, 10, 186–202.
  • Mejias, R. J., & Balthazard, P. A. (2014). A model of information security awareness for assessing information security risk for emerging technologies. Journal of Information Privacy and Security, 10, 160–185.
  • Pahnila, S., Siponena M., & Mahmood, A. (2007, January). Employees’ behavior towards IS security policy compliance. Paper presented at the 40th Annual Hawaii International Conference on System Sciences, Waikoloa, HI.
  • Parks, R. F., & T. Wigand, R. T. (2014). Organizational privacy strategy: Four quadrants of strategic responses to information privacy and security threats. Journal of Information Privacy and Security, 10, 203–224.
  • Pfleeger, S. L., & Caputo, D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31(4), 597 –611.
  • Rhodes, K. (2001). Operations security awareness: The mind has no firewall. Computer Security Journal, 17, 1 –12.
  • Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). An analysis of end user security behaviors. Computers & Security, 24, 124 –133.
  • Steinke, G., Tundrea, E., & Kelly, K. (2011). Towards an understanding of web application security threats and incidents. Journal of Information Privacy & Security, 7(4), 54 –69.
  • Vroom, C., & von Solms, R. (2004). Towards information security behavioral compliance. Information Management & Computer Security, 6(4), 167 –173.
  • Yan, G., Shemroske, K., & Black, G. (2014). Altering security perceptions through the use of geo-authentication. Journal of Information Privacy and Security, 10, 225–235.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.