Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 25 Issue 5

Category:

Information and Knowledge Management

Table Of Contents

Information security management and the human aspect in organizations

Harrison Stewart, Jan Jürjens

The aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to…

pdf (3.6 MB)

Understanding of e-service security dimensions and its effect on quality and intention to use

Hamed Taherdoost

Security has been a critical matter in the development of electronic services. The purpose of this research is to develop a new model to help e-service practitioners and…

pdf (753 KB)

Measuring attitude towards personal data for adaptive cybersecurity

Joyce Hoese Addae, Michael Brown, Xu Sun, Dave Towey, Milena Radenkovic

This paper presents an initial development of a personal data attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research…

pdf (977 KB)

Escalation of commitment and information security: theories and implications

Dmitriy V. Chulkov

This study aims to explore the challenges that the escalation of commitment poses to information security.

pdf (145 KB)

Spear phishing in organisations explained

Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter Hartel

The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.

pdf (921 KB)

Incorporating privacy in the design of cloud-based systems: a conceptual meta-model

Christos Kalloniatis

The purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system…

pdf (659 KB)

To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions

Takahiko Kajiyama, Murray Jennex, Theophilus Addo

This paper aims to discover factors that are truly affecting cloud adoption decisions in organizations. Many reasons have been given for the adoption, or lack thereof, of…

pdf (3 MB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here