Information Management & Computer Security: Volume 17 Issue 1

Subjects:

Table of contents - Special Issue: Selected papers from the HAISA 2008 symposium

Guest Editors: Steven M. Furnell, Dr Nathan Clarke

An integrated view of human, organizational, and technological challenges of IT security management

Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov

The purpose of this study is to determine the main challenges that IT security practitioners face in their organizations, including the interplay among human, organizational, and…

4885

A cognitive walkthrough of Autopsy Forensic Browser

David J. Bennett, Paul Stephens

The purpose of this paper is to review the usability of the Autopsy Forensic Browser in order to improve future versions of this, or similar, tools.

1285

Formalizing the ranking of authentication products

Kirsi Helkala, Einar Snekkenes

The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific…

756

Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end‐users

Martyn Styles, Theo Tryfonas

The purpose of this case study paper is to demonstrate that, no matter how complex computer security systems are, effort should be concentrated and focused on employees to improve…

1119

Social engineering: assessing vulnerabilities in practice

Taimur Bakhshi, Maria Papadaki, Steven Furnell

The purpose of this paper is to investigate the level of susceptibility to social engineering amongst staff within a cooperating organisation.

2174
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid