Content of Issue 7
|
Information Security Methodology, Replication Studies and Information Security Education |
S. Wendzel, L. Caviglione, A. Checco, A. Mileva, J.-F. Lalande, W. Mazurczyk |
762 |
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems |
D. Fujs, S. Vrhovec, D. Vavpotič |
764 |
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking |
C. Moeckel |
783 |
Utilizing Debugging Information of Applications in Memory Forensics |
M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif |
805 |
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity |
S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič |
827 |