Information and Computer Security: Volume 29 Issue 3

Subjects:

Table of contents

Gender differences in predictors of technology threat avoidance

Andrew R. Gillam, Alina M. Waite

The purpose of this paper is to examine gender differences in predictors of technology threat avoidance motivation and behavior among working US adults. Implications were…

Understanding the disclosure of personal data online

Heather J. Parker, Stephen Flowerday

Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at…

Cyberbullying and cyber-mobbing in developing countries

Aliya Kintonova, Alexander Vasyaev, Viktor Shestak

This paper aims to consider modern internet phenomena such as cyberbullying and cybermobbing. The emphasis in the paper is placed on the problematic issues of the legal practice…

1255

A collaborative approach for national cybersecurity incident management

Oluwafemi Oriola, Adesesan Barnabas Adeyemo, Maria Papadaki, Eduan Kotzé

Collaborative-based national cybersecurity incident management benefits from the huge size of incident information, large-scale information security devices and aggregation of…

Cybersecurity advocates: discovering the characteristics and skills of an emergent role

Julie M. Haney, Wayne G. Lutters

Cybersecurity advocates safeguard their organizations by promoting security best practices. This paper aims to describe the skills and characteristics of successful advocates.

After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations

Atiya Avery

This study aims to evaluate changes to the financial performance of organizations in the 1–4 quarters following a data breach event. The study introduces two new variables…

The “three M’s” counter-measures to children’s risky online behaviors: mentor, mitigate and monitor

Karen Renaud, Suzanne Prior

The purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers…

Do privacy concerns determine online information disclosure? The case of internet addiction

Nik Thompson, Atif Ahmad, Sean Maynard

It is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell