Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 27 Issue 2

Category:

Information and Knowledge Management

Table Of Contents

Key elements of an information security culture in organisations

Frans Nel, Lynette Drevin

The purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key…

pdf (221 KB)

Security monitoring and information security assurance behaviour among employees: An empirical analysis

Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew, Mariati Norhashim

The purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour…

pdf (419 KB)

Cloud privacy objectives a value based approach

David Lewis Coss, Gurpreet Dhillon

To effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across…

pdf (270 KB)

The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language

Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham, Fatimah Alkhudhayr

Nowadays, there is a high demand for online services and applications. However, there is a challenge to keep these applications secured by applying different methods…

pdf (958 KB)

Socio-technical systems cybersecurity framework

Masike Malatji, Sune Von Solms, Annlizé Marnewick

This paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the…

pdf (548 KB)

Actionable threat intelligence for digital forensics readiness

Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, George J. Pangalos

The purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities…

pdf (1.7 MB)

A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures

Omerah Yousuf, Roohie Naaz Mir

Internet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is…

pdf (416 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here