Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 23 Issue 4

Category:

Information and Knowledge Management

Table Of Contents

A framework to assist email users in the identification of phishing attacks

André Lötter, Lynn Futcher

The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying…

pdf (767 KB)

Privacy as a secondary goal problem: an experiment examining control

Thomas Hughes-Roberts

The purpose of this paper is to report on results of an investigation into the impact of adding privacy salient information (defined through the theory of planned…

pdf (787 KB)

Reengineering the user: privacy concerns about personal data on smartphones

Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian Mitrou

This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that…

pdf (93 KB)

Exploring the relationship between student mobile information security awareness and behavioural intent

Bukelwa Ngoqo, Stephen V. Flowerday

The purpose of this paper was to analyse existing theories from the social sciences to gain a better understanding of factors which contribute to student mobile phone…

pdf (473 KB)

Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking

Martin Butler, Rika Butler

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their…

pdf (222 KB)

Engaging stakeholders during late stage security design with assumption personas

Shamal Faily

This paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late…

pdf (468 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here