Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 25 Issue 1

Category:

Information and Knowledge Management

Table Of Contents

Design and validation of a trust-based opportunity-enabled risk management system

Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain

The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge…

pdf (2.5 MB)

Cloud computing assurance – a review of literature guidance

Rossouw von Solms, Melanie Willett

This paper aims to provide guidance on cloud computing assurance from an IT governance point of view. The board and executive management are tasked with ensuring proper…

pdf (357 KB)

So long, and thanks for only using readily available scripts

Hannes Holm, Teodor Sommestad

It is often argued that the increased automation and availability of offensive cyber tools has decreased the skill and knowledge required by attackers. Some say that all…

pdf (468 KB)

Privacy-preserving recommendations in context-aware mobile environments

Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, Emmanouil Stiakakis

This paper aims to address privacy concerns that arise from the use of mobile recommender systems when processing contextual information relating to the user. Mobile…

pdf (566 KB)

Must I, can I? I don’t understand your ambiguous password rules

Kristen K. Greene, Yee-Yin Choong

The purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect…

pdf (2.3 MB)

Auditing for privacy in threshold PKE e-voting

Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang

This paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that…

pdf (521 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here