Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 26

Content of Issue 7
Information Security Methodology, Replication Studies and Information Security Education S. Wendzel, L. Caviglione, A. Checco, A. Mileva, J.-F. Lalande, W. Mazurczyk 762
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems D. Fujs, S. Vrhovec, D. Vavpotič 764
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking C. Moeckel 783
Utilizing Debugging Information of Applications in Memory Forensics M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif 805
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič 827