Table of contents
An activity theory approach to information security non-compliance
Rima Khatib, Henri BarkiThe purpose of this paper is to introduce activity theory (AT) as a new theoretical lens to the field of information security non-compliance by explaining how research in that…
Utilizing a privacy impact assessment method using metrics in the healthcare sector
Eleni-Laskarina Makri, Zafeiroula Georgiopoulou, Costas LambrinoudakisThis study aims to assist organizations to protect the privacy of their users and the security of the data that they store and process. Users may be the customers of the…
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras, Michalis Pavlidis, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio CrespoGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data…
A systematic literature review of the factors affecting smartphone user threat avoidance behaviour
Rika ButlerThere is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats…
Discovering “Insider IT Sabotage” based on human behaviour
Antonia Michael, Jan EloffMalicious activities conducted by disgruntled employees via an email platform can cause profound damage to an organization such as financial and reputational losses. This threat…
PRISM: a strategic decision framework for cybersecurity risk assessment
Rajni Goel, Anupam Kumar, James HaddowThis study aims to develop a framework for cybersecurity risk assessment in an organization. Existing cybersecurity frameworks are complex and implementation oriented. The…
Information and cyber security maturity models: a systematic literature review
Anass Rabii, Saliha Assoul, Khadija Ouazzani Touhami, Ounsa RoudiesThis paper aims to clarify the uncertainty reflected in the current state of information security maturity evaluation where it has not enough matured and converged so that a…
From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls
Vasiliki Diamantopoulou, Aggeliki Tsohou, Maria KarydaThis paper aims to identify the controls provisioned in ISO/IEC 27001:2013 and ISO/IEC 27002:2013 that need to be extended to adequately meet, data protection requirements set by…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell