Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 24 Issue 1

Category:

Information and Knowledge Management

Table Of Contents

Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment

Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos

This work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the…

pdf (381 KB)

Examining the suitability of industrial safety management approaches for information security incident management

Maria Bartnes Line, Eirik Albrechtsen

This paper aims to discuss whether recent theoretical and practical approaches within industrial safety management might be applicable to, and solve challenges experienced…

pdf (292 KB)

Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare

Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, Theodoros Apostolopoulos

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing…

pdf (121 KB)

A study on usability and security features of the Android pattern lock screen

Panagiotis Andriotis, George Oikonomou, Alexios Mylonas, Theo Tryfonas

The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a…

pdf (198 KB)

The impact of repeated data breach events on organisations’ market value

Daniel Schatz, Rabih Bashroush

This study aims to examine the influence of one or more information security breaches on an organisation’s stock market value as a way to benchmark the wider economic…

pdf (385 KB)

User password repetitive patterns analysis and visualization

Xiaoying Yu, Qi Liao

Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical…

pdf (712 KB)

Security behaviors of smartphone users

Amit Das, Habib Ullah Khan

– This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.

pdf (227 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here