Information Management & Computer Security: Volume 15 Issue 5

Subjects:

Table of contents - Special Issue: Selected Papers from the HAISA 2007 Symposium

Guest Editors: Professor Steven Furnell, Dr Nathan Clarke

Comply! Resistance is futile

Themistokles Lazarides

The goal of the paper is to detect any gaps in the legislator's and practitioner's approaches in information systems design and implementation and to evaluate their impact on an…

1527

Vendor availability: a key factor for outsourcing in Chilean ICT sector

Ranjan B. Kini

Currently, in various reports, Chile has been receiving better rankings than other Latin American countries, identifying it as a nation for offshoring many of the business process…

1348

How well are information risks being communicated to your computer end‐users?

Malcolm R. Pattinson, Grantley Anderson

The aim of this paper is, first, to discuss how the risk perceptions of computer end‐users may be influenced by improving the process of risk communication by embedding symbols…

1993

User‐centred security applied to the development of a management information system

Marcus Nohlberg, Johannes Bäckström

This paper aims to use user‐centred security development of a prototype graphical interface for a management information system dealing with information security with upper‐level…

2542

Improving protection mechanisms by understanding online risk

Shirley Atkinson, Chris Johnson, Andy Phippen

The purpose of this research is to examine privacy risks for two groups of individuals for whom privacy is an important issue. Understanding the risks to vulnerable groups leads…

2107

Usable set‐up of runtime security policies

Almut Herzog, Nahid Shahmehri

This paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these…

Toward viable information security reporting systems

Finn Olav Sveen, Jose M. Sarriegi, Eliot Rich, Jose J. Gonzalez

This research paper aims to examine how incident‐reporting systems function and particularly how the steady growth of high‐priority incidents and the semi‐exponential growth of…

1649

On the imbalance of the security problem space and its expected consequences

Konstantin Beznosov, Olga Beznosova

This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the…

1225
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid