Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 26 Issue 1

Category:

Information and Knowledge Management

Table Of Contents

Cybersecurity and information security – what goes where?

Basie von Solms, Rossouw von Solms

The purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management…

pdf (149 KB)

A process model for implementing information systems security governance

Mathew Nicho

The frequent and increasingly potent cyber-attacks because of lack of an optimal mix of technical as well as non-technical IT controls has led to increased adoption of…

pdf (1.7 MB)

A utilitarian re-examination of enterprise-scale information security management

Andrew Stewart

An action is utilitarian when it is both useful and practical. This paper aims to examine a number of traditional information security management practices to ascertain…

pdf (187 KB)

Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance)

Rashmi Anand, Sanjay Medhavi, Vivek Soni, Charru Malhotra, D.K. Banwet

Digital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important…

pdf (979 KB)

Information security policy compliance: a higher education case study

Khaled A. Alshare, Peggy L. Lane, Michael R. Lane

The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model…

pdf (469 KB)

Data security and consumer trust in FinTech innovation in Germany

Harrison Stewart, Jan Jürjens

The purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement…

pdf (555 KB)

Employee fraud and misconduct: empirical evidence from a telecommunication company

Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin

The purpose of this study is to examine whether policies and procedures, one of the fundamental elements in the internal control environment, are adequate and effective in…

pdf (159 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here