Information and Computer Security: Volume 29 Issue 1

Subjects:

Table of contents

Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective

Sheshadri Chatterjee, Soumya Kanti Ghosh, Ranjan Chaudhuri, Sumana Chaudhuri

The purpose of this study is to make an attempt to identify the factors responsible for the adoption of an artificial intelligence (AI)-integrated customer relationship management…

1899

A novel approach for improving information security management and awareness for home environments

Fayez Ghazai Alotaibi, Nathan Clarke, Steven M. Furnell

The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used…

Incorporating the human facet of security in developing systems and services

Bilal Naqvi, Nathan Clarke, Jari Porras

The purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been…

Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach

Rohit Gupta, Baidyanath Biswas, Indranil Biswas, Shib Sankar Sana

This paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios…

Adapting CTF challenges into virtual cybersecurity learning environments

Stylianos Karagiannis, Emmanouil Magkos

This paper aims to highlight the potential of using capture the flag (CTF) challenges, as part of an engaging cybersecurity learning experience for enhancing skills and knowledge…

A systematic review of scales for measuring information security culture

Špela Orehek, Gregor Petrič

The concept of information security culture, which recently gained increased attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on…

3753

Users’ attitude on perceived security of enterprise systems mobility: an empirical study

Ramaraj Palanisamy, Yang Wu

This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…

490

Reaction of users as potential victims of information security breach

Suparak Janjarasjit, Siew H. Chan

The purpose of this study is to examine whether users’ perceived moral affect explains the effect of perceived intensity of emotional distress on responsibility judgment of a…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell