Information and Computer Security: Volume 27 Issue 4

Subjects:

Table of contents

Response awareness and instructional self-efficacy: influences on intent

Leigh A. Mutchler

This paper aims to examine the influence of response awareness on behavioral intent, and introduces instructional self-efficacy, a construct rarely examined within the context of…

Collaborative security risk estimation in agile software development

Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie Williams

Today, agile software development teams in general do not adopt security risk-assessment practices in an ongoing manner to prioritize security work. Protection Poker is a…

An experimental evaluation of bow-tie analysis for security

Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre

Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing…

4292

Identity deception detection: requirements and a model

Estee van der Walt, Jan Eloff

This paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered…

Refining the PoinTER “human firewall” pentesting framework

Jacqueline M. Archibald, Karen Renaud

Penetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell