Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 27 Issue 1

Category:

Information and Knowledge Management

Table Of Contents

A framework for reporting and dealing with end-user security policy compliance

Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan Clarke

It is widely acknowledged that non-compliance of employees with information security polices is one of the major challenges facing organisations. This paper aims to…

pdf (2.5 MB)

Mitigating e-services avoidance: the role of government cybersecurity preparedness

Mohamed Abdelhamid, Victoria Kisekka, Spyridon Samonas

The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by…

pdf (433 KB)

A review of security assessment methodologies in industrial control systems

Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel, Norhamadi Ja’affar

The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat…

pdf (325 KB)

Forensic analysis of Google Allo messenger on Android platform

Vinayak Agrawal, Shashikala Tapaswi

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by…

pdf (2.6 MB)

Customer data security and theft: a Malaysian organization’s experience

Mohd Aizuddin Zainal Abidin, Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin

This study aims to identify weaknesses in current internal control systems in protecting customer data and the drivers that motivate employees to steal customer data and…

pdf (191 KB)

Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills

Melissa Carlton, Yair Levy, Michelle Ramim

Users’ mistakes due to poor cybersecurity skills result in up to 95 per cent of cyber threats to organizations. Threats to organizational information systems continue to…

pdf (1.7 MB)

Effect of long-term orientation on voluntary security actions

Salvatore Aurigemma, Thomas Mattson

This paper aims to examine the impact an individual’s long-term orientation (a cultural dimension) has on their attitude, behavioral intention and actual voluntary…

pdf (437 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here