Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 23 Issue 2

Category:

Information and Knowledge Management

Table Of Contents

Organizational objectives for information security governance: a value focused assessment

Sushma Mishra

The purpose of this study is to develop theoretically grounded and empirically derived organizational security governance (OSG) objectives. Developing organizational…

pdf (235 KB)

Managing perceived risk for customer retention in e-commerce: The role of switching costs

Yung-Shen Yen

This paper aims to explore how perceived risk affects customer loyalty in e-commerce and how switching costs mediate in the relationship between perceived risk and…

pdf (172 KB)

Identifying core control items of information security management and improvement strategies by applying fuzzy DEMATEL

Li-Hsing Ho, Ming-Tsai Hsu, Tieh-Min Yen

The purpose of this paper is to analyze the cause-and-effect relationship and the mutually influential level among information security control items, as well as to…

pdf (176 KB)

Investigating personal determinants of phishing and the effect of national culture

Waldo Rocha Flores, Hannes Holm, Marcus Nohlberg, Mathias Ekstedt

The purpose of the study was twofold: to investigate the correlation between a sample of personal psychological and demographic factors and resistance to phishing; and to…

pdf (200 KB)

The sufficiency of the theory of planned behavior for explaining information security policy compliance

Teodor Sommestad, Henrik Karlzén, Jonas Hallberg

This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and…

pdf (292 KB)

A comprehensive security control selection model for inter-dependent organizational assets structure

Maryam Shahpasand, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, Hoda Ghavamipoor

This paper aims to propose a comprehensive model to find out the most preventive subset of security controls against potential security attacks inside the limited budget…

pdf (1.6 MB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here