Information and Computer Security: Volume 28 Issue 5

Subjects:

Table of contents

GDPR compliance: proposed technical and organizational measures for cloud provider

Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas Lambrinoudakis

The purpose of this paper is to give a brief guidance on what a cloud provider should consider and what further actions to take to comply with General Data Protection Regulation…

The impact of information security management practices on organisational agility

Muhamad Khairulnizam Zaini, Mohamad Noorman Masrek, Mad Khir Johari Abdullah Sani

This study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both…

1345

Constructing secure and memorable passwords

Joakim Kävrestad, Markus Lennartsson, Marcus Birath, Marcus Nohlberg

Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the…

Security behaviour of mobile financial service users

Esther Dzidzah, Kwame Owusu Kwateng, Benjamin Kofi Asante

The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in…

The role of norms in information security policy compliance

Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng, Winfred Yaokumah

The purpose of this paper is to determine which factors influence information system security policy compliance. It examines how different norms influence compliance intention.

A novel trust model for fog computing using fuzzy neural networks and weighted weakest link

Mhamed Zineddine

Trust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing…

How effective are social engineering interventions? A meta-analysis

Jan-Willem Bullee, Marianne Junger

Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell