Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 23 Issue 5

Category:

Information and Knowledge Management

Table Of Contents

Logical acquisition and analysis of data from android mobile devices

Himanshu Srivastava, Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

pdf (1.9 MB)

Information security in supply chains: a management control perspective

Sindhuja P N, Anand S. Kunnathur

This paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This…

pdf (344 KB)

User-centred authentication feature framework

Alain Forget, Sonia Chiasson, Robert Biddle

This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text…

pdf (584 KB)

An empirical test of the accuracy of an attack graph analysis tool

Teodor Sommestad, Fredrik Sandström

The purpose of this paper is to test the practical utility of attack graph analysis. Attack graphs have been proposed as a viable solution to many problems in computer…

pdf (315 KB)

Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study

Abdulrahman Alqahtani

The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…

pdf (2.5 MB)

Taxonomy of technological risks of open source software in the enterprise adoption context

Mario Silic, Andrea Back, Dario Silic

– The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.

pdf (323 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here