Most Cited


Top 10 Cited (articles published in the last five years)
Extracted from Scopus (on Mar 27 )

16 Furnell, S. | Thomson, K.-L.
From culture to disobedience: Recognising the varying user acceptance of IT security
Computer Fraud and Security, Volume 2009, Issue 2, 2009-02-01, Pages 5-10
6 Atkinson, S. | Furnell, S. | Phippen, A.
Securing the next generation: enhancing e-safety awareness among young people
Computer Fraud and Security, Volume 2009, Issue 7, 2009-07-01, Pages 13-19
6 Everett, C.
Social media: Opportunity or risk?
Computer Fraud and Security, Volume 2010, Issue 6, 2010-08-13, Pages 8-10
5 Everett, C.
Biometrics-based Surveillance: Big Brother or vital safeguard?
Computer Fraud and Security, Volume 2009, Issue 11, 2009-11-01, Pages 5-7
5 Hawthorn, N.
Finding security in the cloud
Computer Fraud and Security, Volume 2009, Issue 10, 2009-10-01, Pages 19-20
4 Beautement, A. | Sasse, A.
The economics of user effort in information security
Computer Fraud and Security, Volume 2009, Issue 10, 2009-10-01, Pages 8-12
4 Parmar, B.
Protecting against spear-phishing
Computer Fraud and Security, Volume 2012, Issue 1, 2012-01-01, Pages 8-11
4 Aaron, G.
The state of phishing
Computer Fraud and Security, Volume 2010, Issue 6, 2010-08-13, Pages 5-8
4 Everett, C.
Cloud computing - A question of trust
Computer Fraud and Security, Volume 2009, Issue 6, 2009-06-01, Pages 5-7
3 Mansfield-Devine, S.
Security review: The past year
Computer Fraud and Security, Volume 2013, Issue 1, 2013-01-01, Pages 5-11