Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 28 Issue 1

Category:

Information and Knowledge Management

Table Of Contents

Matching training to individual learning styles improves information security awareness

Malcolm Pattinson, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac

This paper aims to introduce the concept of a framework of cyber-security controls that are adaptable to different types of organisations and different types of employees…

pdf (151 KB)

Mobile agent-based SIEM for event collection and normalization externalization

Nabil Moukafih, Ghizlane Orhanou, Said Elhajji

This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event…

pdf (1.6 MB)

Evaluating privacy impact assessment methods: guidelines and best practice

Konstantina Vemou, Maria Karyda

This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines…

pdf (214 KB)

The cyber-insurance market in Norway

Hayretdin Bahşi, Ulrik Franke, Even Langfeldt Friberg

This paper aims to describe the cyber-insurance market in Norway but offers conclusions that are interesting to a wider audience.

pdf (174 KB)

Requirements for private communications over public spheres

Konstantina Vemou, Maria Karyda

In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are…

pdf (432 KB)

Patient use of online medical records: an application of technology acceptance framework

Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter, Brian J. Reithel

Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and…

pdf (225 KB)

AppAware: a policy visualization model for mobile applications

Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis

Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach…

pdf (2.1 MB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here