Editorial Board
Special issue introduction: A comprehensive perspective on information systems security — technical advances and behavioral issues
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
Harmonized authentication based on ThumbStroke dynamics on touch screen mobile phones
Continuance of protective security behavior: A longitudinal study
Employees' information security policy compliance: A norm activation perspective
An assessment of opportunity-reducing techniques in information security: An insider threat perspective
Governing the fiduciary relationship in information security services
Resistance and power in a security certification scheme: The case of c:cure
Effects of assurance mechanisms and consumer concerns on online purchase decisions: An empirical study
Transaction security investments in online marketplaces: An analytical examination of financial liabilities