Journal of Intellectual Capital: Volume 21 Issue 2


Table of contents - Special Issue: Information Security & Privacy

Guest Editors: Karen Renaud

The effects of voluntary GDPR adoption and the readability of privacy statements on customers’ information disclosure intention and trust

Yibo Zhang, Tawei Wang, Carol Hsu

The purpose of this paper is to examine the impacts of companies’ voluntary adoption of the General Data Protection Regulation (GDPR) as well as the readability of privacy…


Too little too late: can we control browser fingerprinting?

Nasser Mohammed Al-Fannah, Chris Mitchell

Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major…

Protecting intellectual property from insider threats: A management information security intelligence perspective

Hyungjin Lukas Kim, Anat Hovav, Jinyoung Han

The purpose of this paper is to propose a theory of information security intelligence and examine the effects of managers’ information security intelligence (MISI) on employees’…


Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training

Wu He, Ivan Ash, Mohd Anwar, Ling Li, Xiaohong Yuan, Li Xu, Xin Tian

An organization’s ability to successfully manage intellectual capital is determined by the actions of its employees to prevent or minimize information security incidents. To…


Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory

Anthony Duke Giwah, Ling Wang, Yair Levy, Inkyoung Hur

The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user…


Modelling adaptive information security for SMEs in a cluster

Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck, Verónica Burriel Coll

This paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized…


PRECEPT: a framework for ethical digital forensics investigations

R.I. Ferguson, Karen Renaud, Sara Wilford, Alastair Irons

Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics…


Out to explore the cybersecurity planet

Giampaolo Bella

Security ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of…

Cover of Journal of Intellectual Capital



Online date, start – end:


Copyright Holder:

Emerald Publishing Limited

Open Access:



  • Professor Merrill Warkentin