Information and Computer Security
Issue(s) available: 38 – From Volume: 23 Issue: 1, to Volume: 30 Issue: 3

Volume 29
Volume 26
Volume 24
Preventing social engineering: a phenomenological inquiry
Lily Pharris, Begona Perez-MiraThe purpose of this transcendental phenomenological qualitative research study is to understand the essence of what it is like to be an information systems professional…
BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures
Ioannis Stylios, Andreas Skalkos, Spyros Kokolakis, Maria KarydaThis paper is an extended version of SECPRE 2021 paper and presents a research on the development and validation of a behavioral biometrics continuous authentication…
Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?
Vikram S. Bhadauria, Anitha ChennamaneniThis study aims to investigate the threat phenomenon as perceived by Internet of Things (IoT) users and examines the role of anxiety, desire and personal innovativeness in…
Understanding employees’ information security–related stress and policy compliance intention: the roles of information security fatigue and psychological capital
Hao Chen, Mengya Liu, Tu LyuThis study aims to explore the emotion-based mediator of information security fatigue in the relationship between employees’ information security–related stress (SRS) and…
Understanding the role of users’ socio-location attributes and their privacy implications on social media
Katerina Vgena, Angeliki Kitsiou, Christos KalloniatisThe purpose of this paper is to establish reciprocity among socio-location attributes while underlining the additional users’ privacy implications on social media (SM).
How do non experts think about cyber attack consequences?
Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. ArmstrongNonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language…
A conceptualization of the privacy concerns of cloud users
Dijana Peras, Renata MekovecThe purpose of this paper is to improve the understanding of cloud service users’ privacy concerns, which are anticipated to considerably hinder cloud service market…
Utility indicator for emotion detection in a speaker authentication system
Ebenhaeser Otto Janse van Rensburg, Reinhardt A. Botha, Rossouw von SolmsAuthenticating an individual through voice can prove convenient as nothing needs to be stored and cannot easily be stolen. However, if an individual is authenticating…
A game model design using test bed for Malware analysis training
Marium Khalid, Mehreen Afzal, Waseem IqbalThis article aims to provide an interactive model for hands on training of malware analysis. Cyberwar games are the highly stylized representation of cyber conflicts in a…
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors
Eric Amankwa, Marianne Loock, Elmarie KritzingerThis paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information…
A systematic framework to explore the determinants of information security policy development and outcomes
Harrison StewartThis paper aims to develop an effective information security policy (ISP), which is an important mechanism to combat insider threats.
User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina
Suncica Hadzidedic, Silvia Fajardo-Flores, Belma Ramic-BrkicThis paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware…
Toward an architecture to improve privacy and informational self-determination through informed consent
Mohamad GharibMost developed countries have enacted privacy laws to govern the collection and use of personal information (PI) as a response to the increased misuse of PI. Yet, these…
A quantification mechanism for assessing adherence to information security governance guidelines
Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut, Angelo CavalloBoards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing…
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios ChatzisFor the success of future investments in the implementation of continuous authentication systems, we should explore the key factors that influence technology adoption. The…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell