Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 24 Issue 4

Category:

Information and Knowledge Management

Table Of Contents

An efficient intrusion detection and prevention framework for ad hoc networks

Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…

pdf (1.9 MB)

Stress-based security compliance model – an exploratory study

Hiep-Cong Pham, Jamal El-Den, Joan Richardson

This paper aims to extend current information security compliance research by adapting “work-stress model” of the extended Job Demands-Resources model to explore how…

pdf (314 KB)

Online privacy and security concerns of consumers

Anil Gurung, M.K. Raja

Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers…

pdf (321 KB)

Spot the phish by checking the pruned URL

Melanie Volkamer, Karen Renaud, Paul Gerber

Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical…

pdf (927 KB)

Leveraging autobiographical memory for two-factor online authentication

Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque, Matthew Wright

Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although…

pdf (157 KB)

Why don’t UK citizens protest against privacy-invading dragnet surveillance?

Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer

The purpose of this study was to identify to identify reasons for the lack of protest against dragnet surveillance in the UK. As part of this investigation, a study was…

pdf (508 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here