Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 26 Issue 3

Category:

Information and Knowledge Management

Table Of Contents - Special Issue: Human Aspects of Security

Guest editorial

Steven Furnell, Nathan Clarke

pdf (51 KB)

Persuading end users to act cautiously online: a fear appeals study on phishing

Jurjen Jansen, Paul van Schaik

The purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In…

pdf (193 KB)

The effect of resilience and job stress on information security awareness

Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Meredith Lillie

The purpose of this study was to investigate the relationship between resilience, job stress and information security awareness (ISA). The study examined the effect of…

pdf (179 KB)

I shall, we shall, and all others will: paradoxical information security behaviour

Dirk P. Snyman, Hennie Kruger, Wayne D. Kearney

The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.

pdf (352 KB)

Identifying and predicting the factors affecting end-users’ risk-taking behavior

Manal Alohali, Nathan Clarke, Fudong Li, Steven Furnell

The end-user has frequently been identified as the weakest link; however, motivated by the fact that different users react differently to the same stimuli, identifying the…

pdf (1.2 MB)

In their own words: employee attitudes towards information security

Debi Ashenden

The purpose of this study is to uncover employee attitudes towards information security and to address the issue of social acceptability bias in information security research.

pdf (118 KB)

An information privacy culture instrument to measure consumer privacy expectations and confidence

Adéle Da Veiga

This paper aims to propose an information privacy culture index framework (IPCIF) with a validated information privacy culture index instrument (IPCII) to measure…

pdf (3.9 MB)

Security questions education: exploring gamified features and functionalities

Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage

Security questions are one of the techniques used to recover forgotten passwords. However, security questions have both security and memorability limitations. To limit…

pdf (664 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here