Information Management & Computer Security: Volume 19 Issue 4


Table of contents

A longitudinal analysis of data breaches

Chlotia Posey Garrison, Matoteng Ncube

The purpose of this research is to provide companies and consumers with information about the potential connections between data breach types and institutions. This study…

A quantitative evaluation of vulnerability scanning

Hannes Holm, Teodor Sommestad, Jonas Almroth, Mats Persson

The purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent…

Enhancing SSADM with disaster recovery plan activities

George Aggelinos, Sokratis K. Katsikas

The purpose of this paper is to propose the integration of disaster recovery plan (DRP) objects development activities with the activities of the structured system…

Shaping security behaviour through discipline and agility: Implications for information security management

Dan Harnesk, John Lindström

The purpose of this paper is to broaden the understanding about security behaviour by developing a security behaviour typology based on the concepts of discipline and agility.

Cover of Information Management & Computer Security



Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access: