Information and Computer Security: Volume 30 Issue 1

Subjects:

Table of contents

Evaluating user susceptibility to phishing attacks

Sanchari Das, Christena Nippert-Eng, L. Jean Camp

Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data…

1550

An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection

Xiaoyun Ye, Myung-Mook Han

By using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior…

To click or not to click the link: the factors influencing internet banking users’ intention in responding to phishing emails

Suganthi Manoharan, Norliza Katuk, Syahida Hassan, Rahayu Ahmad

Despite internet banking’s popularity, there is a rise in phishing attacks related to online banking transactions. Phishing attacks involved the process of sending out electronic…

1407

Response to a phishing attack: persuasion and protection motivation in an organizational context

Piers Bayl-Smith, Ronnie Taib, Kun Yu, Mark Wiggins

This study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an…

1152

The impact of general data protection regulation on software engineering practices

Luís Leite, Daniel Rodrigues dos Santos, Fernando Almeida

This paper aims to explore the changes imposed by the general data protection regulation (GDPR) on software engineering practices. The fundamental objective is to have a…

How different rewards tend to influence employee non-compliance with information security policies

Rima Khatib, Henri Barki

To help reduce the increasing number of information security breaches that are caused by insiders, past research has examined employee non-compliance with information security…

To sell, or not to sell: social media data-breach in second-hand Android devices

Oussama BenRhouma, Ali AlZahrani, Ahmad AlKhodre, Abdallah Namoun, Wasim Ahmad Bhat

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android…

Cyberattacks against the health-care sectors during the COVID-19 pandemic

Ruti Gafni, Tal Pavel

This paper aims to analyze the changes in cyberattacks against the health-care sector during the COVID-19 pandemic.

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell