Issue 5 2018
Issue 4 2018
Issue 3 2018 Human Aspects of Security
Issue 2 2018 Value Conflicts and Information Security Management
Issue 1 2018
Issue 5 2016
Issue 4 2016
Issue 3 2016 Selected papers from Kaspersky Lab′s CyberSecurity for the Next Generation Conference
Issue 2 2016 Human Aspects of Information Security
Issue 1 2016
Computer games that teach cybersecurity concepts have been developed to help both individuals and organizations shore up their defence against cybercrimes. Evidence of the…
This study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an…
Reducing tax identity theft by identifying vulnerability points in the electronic tax filing processBenjamin K. Ngugi, Kuo-Ting Hung, Yuanxiang John Li
Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund…
To click or not to click the link: the factors influencing internet banking users’ intention in responding to phishing emailsSuganthi Manoharan, Norliza Katuk, Syahida Hassan, Rahayu Ahmad
Despite internet banking’s popularity, there is a rise in phishing attacks related to online banking transactions. Phishing attacks involved the process of sending out…
The purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical…
An information classification model for public sector organizations in Sweden: a case study of a Swedish municipalityJan-Halvard Bergquist, Samantha Tinet, Shang Gao
The purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.
From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in SwedenAna Faizi, Ali Padyab, Andreas Naess
This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.
Predicting information security culture among employees of telecommunication companies in an emerging marketNurul Asmui Azmi Md Azmi, Ai Ping Teoh, Ali Vafaei-Zadeh, Haniruzila Hanifah
The purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this…
The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand…
The purpose of this study is to develop a model called “IaaS adoption” to identify the various challenges and precise implications that hinder the adoption of…
To help reduce the increasing number of information security breaches that are caused by insiders, past research has examined employee non-compliance with information…
This paper aims to analyze the changes in cyberattacks against the health-care sector during the COVID-19 pandemic.
With the rapid deployment of internet of things (IoT) technologies, it has been essential to address the security and privacy issues through maintaining transparency in…
This paper aims to explore the changes imposed by the general data protection regulation (GDPR) on software engineering practices. The fundamental objective is to have a…
Information technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how…
The purpose of this paper is to propose practical and usable interactions that will allow more informed, risk-aware comparisons for individuals during app selections. The…
This study aims to develop a scale to measure the cloud provider’s performance and it investigates the factors that impact that performance from the users’ perspective.
Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: a cross-country analysisBen Krishna, Sebastian M.P.
This study aims to propose a model to examine the relationships between e-government development, cybersecurity commitment, business usage and economic prosperity of the country.
The purpose of this paper is to reveal the lived experiences of dyslexics in engaging with all kinds of alphanumeric authentication mechanisms.
This study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time…
Factors affecting organizational adoption and acceptance of computer-based security awareness training toolsLaila Dahabiyeh
As insiders remain to be a main reason behind security breaches, effective information security awareness campaigns become critical in protecting organizations from…
The purpose of this study is to determine effective online safety awareness education for young people in less developed countries. The research followed an explanatory…
This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.
This paper aims to introduce the concept of cybersecurity footprint.
This paper outlines the development of a validated questionnaire for assessing information security behaviour. The purpose of this paper is to present data from the…
For decades, literature has reported on the perceived conflict between usability and security. This mutual trade-off needs to be considered and addressed whenever security…
An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detectionXiaoyun Ye, Myung-Mook Han
By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the…
Renamed from:Information Management & Computer Security
Online date, start – end:2015
Copyright Holder:Emerald Publishing Limited
- Prof Steven Furnell