Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 26 Issue 5

Category:

Information and Knowledge Management

Table Of Contents

Assessing the information quality of phishing-related content on financial institutions’ websites

Rika Butler, Martin Butler

Phishing attacks exploit social vulnerabilities and remain a global concern. Financial institutions often use their websites as part of their online awareness and…

pdf (866 KB)

Work-related groups and information security policy compliance

Teodor Sommestad

It is widely acknowledged that norms and culture influence decisions related to information security. The purpose of this paper is to investigate how work-related groups…

pdf (257 KB)

Ontology-based information security compliance determination and control selection on the example of ISO 27002

Stefan Fenz, Thomas Neubauer

The purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and…

pdf (1.7 MB)

Information security practice in Saudi Arabia: case study on Saudi organizations

Zakarya A. Alzamil

Information security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the…

pdf (139 KB)

An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture

Adéle Da Veiga

Employee behaviour is a continuous concern owing to the number of information security incidents resulting from employee behaviour. The purpose of this paper is to propose…

pdf (437 KB)

MMSPhiD: a phoneme based phishing verification model for persons with visual impairments

Gunikhan Sonowal, KS Kuppusamy

This paper aims to propose a model entitled MMSPhiD (multidimensional similarity metrics model for screen reader user to phishing detection) that amalgamates multiple…

pdf (1.4 MB)

Impact of cyberattacks on stock performance: a comparative study

Samuel Tweneboah-Kodua, Francis Atsu, William Buchanan

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period from January 03, 2013, to December 29, 2017.

pdf (435 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here