Journals Books Case Studies Expert Briefings Open Access
Advanced search

Information and Computer Security: Volume 28 Issue 2

Category:

Information and Knowledge Management

Table Of Contents

Enhancing cyber security behavior: an internal social marketing approach

Hiep Cong Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma, Minh Nhat Nguyen

Understanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This…

pdf (1.1 MB)

The willingness to disclose personal information: Trade-off between privacy concerns and benefits

Ibrahim M. Al-Jabri, Mustafa I. Eid, Amer Abed

Customer privacy and security are major concerns. Online firms worldwide collect customer data for various reasons. This study aims to investigate factors that motivate…

pdf (257 KB)

Automated data-driven profiling: threats for group privacy

Paola Mavriki, Maria Karyda

User profiling with big data raises significant issues regarding privacy. Privacy studies typically focus on individual privacy; however, in the era of big data analytics…

pdf (177 KB)

Cloud computing in SMEs: towards delegation of the CIO role

Wafa Bouaynaya

The purpose of this paper is to contribute to a growing body of research on information systems security, by studying open source alternatives for cloud computing. Several…

pdf (341 KB)

The hunt for computerized support in information security policy management: A literature review

Elham Rostami, Fredrik Karlsson, Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has…

pdf (1.1 MB)

What do we know about information security governance?: “From the basement to the boardroom”: towards digital security governance

Stef Schinagl, Abbas Shahim

This paper aims to review the information security governance (ISG) literature and emphasises the tensions that exist at the intersection of the rapidly changing business…

pdf (410 KB)

Cybersecurity behaviour of smartphone users in India: an empirical analysis

Pintu Shah, Anuja Agarwal

For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence…

pdf (241 KB)

ISSN:

2056-4961

Renamed from:

Information Management & Computer Security

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open access:

hybrid

Editor:

  • Prof Steven Furnell

Further Information

  • About the Journal(opens new window)
  • Purchase Information(opens new window)
  • Editorial Team(opens new window)
  • Write for this journal(opens new window)
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2020 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication Sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here