Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 25 Issue 2

Category:

Information and Knowledge Management

Table Of Contents

Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study

Lena Yuryna Connolly, Michael Lang, John Gathegi, Doug J. Tygar

This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security…

pdf (254 KB)

Productivity vs security: mitigating conflicting goals in organizations

Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt

This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.

pdf (115 KB)

The application of behavioural thresholds to analyse collective behaviour in information security

Dirk Snyman, Hennie Kruger

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

pdf (461 KB)

Comparing three models to explain precautionary online behavioural intentions

Jurjen Jansen, Paul van Schaik

The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection…

pdf (380 KB)

Managing information security awareness at an Australian bank: a comparative study

Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic

The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries…

pdf (202 KB)

Factors in an end user security expertise instrument

Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp

The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and…

pdf (428 KB)

Social engineering defence mechanisms and counteracting training strategies

Peter Schaab, Kristian Beckers, Sebastian Pape

This paper aims to outline strategies for defence against social engineering that are missing in the current best practices of information technology (IT) security. Reason…

pdf (331 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here