Information and Computer Security
Issue(s) available: 42 – From Volume: 23 Issue: 1, to Volume: 31 Issue: 2

Volume 29
Volume 26
Volume 24
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
Khalid Shaheen, Ali Hussein ZolaitThis study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the…
Smart home cybersecurity awareness and behavioral incentives
N’guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki KadobayashiSmart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few…
Advance fee fraud scammers’ criminal expertise and deceptive strategies: a qualitative case study
Alain Tambe EbotThis study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.
A systematic literature review of how cybersecurity-related behavior has been assessed
Kristian Kannelønning, Sokratis K. KatsikasCybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness…
Problems in information classification: insights from practice
Simon AnderssonThis study aims to identify problems connected to information classification in theory and to put those problems into the context of experiences from practice.
Enhancing the design of data-related privacy controls for smart home devices
Chola Chhetri, Vivian Genaro MottiPast research shows that users of smart home devices (SHDs) have privacy concerns. These concerns have been validated from technical research that shows SHDs introduce a…
Examining the effect of different knowledge aspects on information security awareness
Hui Na Chua, Vi Vien Khor, Siew Fan WongThe purpose of this paper is to identify the different aspects of knowledge and how they associate with information security awareness (ISA). The paper also explores how…
How privacy concerns impact Swedish citizens’ willingness to report crimes: a quantitative mobile phone survey
Gunnar Lindqvist, Joakim KävrestadThe purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the…
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros MaglarasThis paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's…
Improving cybersecurity skill development through visual programming
Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther PernulCybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking…
Risk homeostasis and security fatigue: a case study of data specialists
Anusha Bhana, Jacques OphoffOrganisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on…
Policy components – a conceptual model for modularizing and tailoring of information security policies
Elham Rostami, Fredrik Karlsson, Shang GaoThis paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
A model for information security culture with creativity and innovation as enablers – refined with an expert panel
Adéle Da VeigaThis study aims to elicit an understanding of creativity and innovation to enable a totally aligned information security culture. A model is proposed to encourage…
Cyber terrorism cases and stock market valuation effects
Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. BoyleCyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital…
An exploration of Australian attitudes towards privacy
Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, Michael CrowleyUsing technology to meet national security expectations and requirements is not new. Nations attempt to strike a balance between security and the (expressed or otherwise…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell