Table of contents
From theory to practice: guidelines for enhancing information security management
Ioanna Topa, Maria KarydaThis study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with current…
Published incidents and their proportions of human error
Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge JanickeThis paper aims to provide an understanding of the proportions of incidents that relate to human error. The information security field experiences a continuous stream of…
Revisiting information security risk management challenges: a practice perspective
Erik Bergström, Martin Lundgren, Åsa EricsonThe study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices.
Contrasting cybersecurity implementation frameworks (CIF) from three countries
Adenekan Dedeke, Katherine MastersonThis paper aims to explore the evolution of a trend in which countries are developing or adopting cybersecurity implementation frameworks that are intended to be used nationally…
Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)
Maria Bada, Jason R.C. NurseThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a high-level programme for cybersecurity education and awareness to be used when…
A conceptual model and empirical assessment of HR security risk management
Peace Kumah, Winfred Yaokumah, Eric Saviour Aryee OkaiThis study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage…
Security gaps assessment of smart grid based SCADA systems
Abdul Wahid Mir, Ramkumar Ketti RamachandranSupervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security will lead…
Understanding passwords – a taxonomy of password creation strategies
Joakim Kävrestad, Fredrik Eriksson, Marcus NohlbergUsing authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remains the…
Information protection behaviors: morality and organizational criticality
Nancy K. Lankton, Charles Stivason, Anil GurungOrganizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less clear…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell