Table of contents
Key competencies for critical infrastructure cyber-security: a systematic literature review
Nabin Chowdhury, Vasileios GkioulosThe purpose of this paper can be encapsulated in the following points: identify the research papers published on the topic: competencies and skills necessary for critical…
Introducing the concept of cybersecurity footprint
Yair Levy, Ruti GafniThis paper aims to introduce the concept of cybersecurity footprint.
Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: a cross-country analysis
Ben Krishna, Sebastian M.P.This study aims to propose a model to examine the relationships between e-government development, cybersecurity commitment, business usage and economic prosperity of the country.
Validating an information privacy governance questionnaire to measure the perception of employees
Paulus Swartz, Adele Da Veiga, Nico MartinsThis study aims to conduct a survey in a bank to measure the perception of employees towards the effective governance of information privacy and at the same time validating the…
Visualising personas as goal models to find security tensions
Shamal Faily, Claudia Iacob, Raian Ali, Duncan Ki-AriesThis paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.
Users’ perception of cybersecurity, trust and cloud computing providers’ performance
Hongjiang Xu, Sakthi MahenthiranThis study aims to develop a scale to measure the cloud provider’s performance and it investigates the factors that impact that performance from the users’ perspective.
Factors affecting organizational adoption and acceptance of computer-based security awareness training tools
Laila DahabiyehAs insiders remain to be a main reason behind security breaches, effective information security awareness campaigns become critical in protecting organizations from security…
Exploring potential gender differences in information security and privacy
Tanya McGill, Nik ThompsonInformation technology users often fail to adopt necessary security and privacy measures, leading to increased risk of cybercrimes. There has been limited research on how…
Predicting information security culture among employees of telecommunication companies in an emerging market
Nurul Asmui Azmi Md Azmi, Ai Ping Teoh, Ali Vafaei-Zadeh, Haniruzila HanifahThe purpose of this study is to examine factors, which influence information security culture among employees of telecommunications companies. The motivation for this study was…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell