Information Management & Computer Security: Volume 21 Issue 5


Table of contents

A comparison of password feedback mechanisms and their impact on password entropy

Mark Ciampa

Text-based passwords created by users are typically weak. A common mitigation is to provide meaningful feedback to users regarding the relative strength of their newly…

Unified trust establishment by leveraging remote attestation – modeling and analysis

Hamed Khiabani, Norbik Bashah Idris, Jamalul-lail Ab Manan

Ambient service provisioning with the least human participation in a pervasive computing environment, which is composed of interconnected devices and sensors, raises…

A survey of security risks of mobile social media through blog mining and an extensive literature search

Wu He

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of…

Deriving an information security assurance indicator at the organizational level

Vinod Pathari, Rajendra M. Sonar

Measurement of information security assurance (ISA) is an important but difficult task. This paper aims to propose a framework, which helps in refining information…

Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space

Michael Levi, Matthew Leighton Williams

– This paper aims to map out multi-agency partnerships in the UK information assurance (UKIA) network in the UK.

Cover of Information Management & Computer Security



Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access: