Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 25 Issue 4

Category:

Information and Knowledge Management

Table Of Contents

A cyber-threat analytic model for autonomous detection of virtual property theft

Nicholas Patterson, Michael Hobbs, Tianqing Zhu

The purpose of this study is to provide a framework to detect and prevent virtual property theft in virtual world environments. The issue of virtual property theft is a…

pdf (811 KB)

State transgression on electronic expression: is it for real?

Argha Ray, Anjali Kaushik

Cyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries…

pdf (2.5 MB)

Workarounds and trade-offs in information security – an exploratory study

Rogier Woltjer

The purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies…

pdf (438 KB)

Deterrence and punishment experience impacts on ISP compliance attitudes

Salvatore Aurigemma, Thomas Mattson

The paper aims to examine the inconclusive impacts of sanction-related deterrence on employee information security policy (ISP) compliance from the extant literature. It…

pdf (270 KB)

Human-centered authentication guidelines

Jeremiah D. Still, Ashley Cain, David Schuster

Despite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been…

pdf (198 KB)

On data leakage from non-production systems

Jacqueline Cope, Francois Siewe, Feng Chen, Leandros Maglaras, Helge Janicke

This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production…

pdf (608 KB)

A systematic approach to investigating how information security and privacy can be achieved in BYOD environments

Abubakar Garba Bello, David Murray, Jocelyn Armarego

This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced…

pdf (781 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here