Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 23 Issue 3

Category:

Information and Knowledge Management

Table Of Contents

Information security culture – state-of-the-art review between 2000 and 2013

Fredrik Karlsson, Joachim Åström, Martin Karlsson

The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this…

pdf (266 KB)

Language-independent gender identification through keystroke analysis

Ioannis Tsimperidis, Vasilios Katos, Nathan Clarke

– The purpose of this paper is to investigate the feasibility of identifying the gender of an author by measuring the keystroke duration when typing a message.

pdf (382 KB)

Management commitment and awareness creation – ICT safety and security in electric power supply network companies

Ruth Østgaard Skotnes

This paper aims to follow-up on previous research by studying the degree of management commitment to information and communication technology (ICT) safety and security…

pdf (244 KB)

Strategic cyber intelligence

Randy Borum, John Felker, Sean Kern, Kristen Dennesen, Tonya Feyes

This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives…

pdf (118 KB)

Examining the effectiveness of phishing filters against DNS based phishing attacks

Swapan Purkait

This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using…

pdf (130 KB)

Investigating the work practices of network security professionals

Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Gunes Kayacik

– The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.

pdf (432 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here