Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 27 Issue 3

Category:

Information and Knowledge Management

Table Of Contents

From theory to practice: guidelines for enhancing information security management

Ioanna Topa, Maria Karyda

This study aims to identify the implications of security behaviour determinants for security management to propose respective guidelines which can be integrated with…

pdf (204 KB)

Published incidents and their proportions of human error

Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke

This paper aims to provide an understanding of the proportions of incidents that relate to human error. The information security field experiences a continuous stream of…

pdf (322 KB)

Revisiting information security risk management challenges: a practice perspective

Erik Bergström, Martin Lundgren, Åsa Ericson

The study aims to revisit six previously defined challenges in information security risk management to provide insights into new challenges based on current practices.

pdf (165 KB)

Contrasting cybersecurity implementation frameworks (CIF) from three countries

Adenekan Dedeke, Katherine Masterson

This paper aims to explore the evolution of a trend in which countries are developing or adopting cybersecurity implementation frameworks that are intended to be used…

pdf (194 KB)

Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs)

Maria Bada, Jason R.C. Nurse

The purpose of this study is to focus on organisation’s cybersecurity strategy and propose a high-level programme for cybersecurity education and awareness to be used when…

pdf (500 KB)

A conceptual model and empirical assessment of HR security risk management

Peace Kumah, Winfred Yaokumah, Eric Saviour Aryee Okai

This study aims to develop a conceptual model and assess the extent to which pre-, during- and post-employment HR security controls are applied in organizations to manage…

pdf (555 KB)

Security gaps assessment of smart grid based SCADA systems

Abdul Wahid Mir, Ramkumar Ketti Ramachandran

Supervisory control and data acquisition (SCADA) systems security is of paramount importance, and there should be a holistic approach to it, as any gap in the security…

pdf (548 KB)

Understanding passwords – a taxonomy of password creation strategies

Joakim Kävrestad, Fredrik Eriksson, Marcus Nohlberg

Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords…

pdf (989 KB)

Information protection behaviors: morality and organizational criticality

Nancy K. Lankton, Charles Stivason, Anil Gurung

Organizational insiders play a critical role in protecting sensitive information. Prior research finds that moral beliefs influence compliance decisions. Yet, it is less…

pdf (481 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here