N B and Mathew S.
(2025). Exploring the factors influencing information security policy compliance and violations. Computers and Security. 147:C. Online publication date: 1-Dec-2024.
Sarfraz M, Khawaja K and Um-e-Farwah .
(2024). Is the internet a double-edged sword for organizations? An empirical study on cyberloafing. Information Technology and Management. 25:4. (319-333). Online publication date: 1-Dec-2024.
Zahedi F, Chen Y and Zhao H.
(2024). Ontology-Based Intelligent Interface Personalization for Protection Against Phishing Attacks. Information Systems Research. 35:3. (1463-1478). Online publication date: 1-Sep-2024.
Xie Y, Siponen M, Laatikainen G, Moody G and Zheng X.
(2024). Testing the dominant mediator in EPPM. Computers and Security. 140:C. Online publication date: 1-May-2024.
Ali R and Dominic P.
(2024). Investigation of information security policy violations among oil and gas employees. Journal of Information Science. 50:1. (254-272). Online publication date: 1-Feb-2024.