Table of contents
How do non experts think about cyber attack consequences?
Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. ArmstrongNonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe…
A systematic framework to explore the determinants of information security policy development and outcomes
Harrison StewartThis paper aims to develop an effective information security policy (ISP), which is an important mechanism to combat insider threats.
A quantification mechanism for assessing adherence to information security governance guidelines
Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut, Angelo CavalloBoards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of…
Toward an architecture to improve privacy and informational self-determination through informed consent
Mohamad GharibMost developed countries have enacted privacy laws to govern the collection and use of personal information (PI) as a response to the increased misuse of PI. Yet, these laws rely…
Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios ChatzisFor the success of future investments in the implementation of continuous authentication systems, we should explore the key factors that influence technology adoption. The authors…
The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors
Eric Amankwa, Marianne Loock, Elmarie KritzingerThis paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information…
User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina
Suncica Hadzidedic, Silvia Fajardo-Flores, Belma Ramic-BrkicThis paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens…
A game model design using test bed for Malware analysis training
Marium Khalid, Mehreen Afzal, Waseem IqbalThis article aims to provide an interactive model for hands on training of malware analysis. Cyberwar games are the highly stylized representation of cyber conflicts in a…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell