Information Management & Computer Security: Volume 21 Issue 3

Subjects:

Table of contents

A research framework for social commerce adoption

Mahmood Hajli

Social relationships on the internet through the emergence of Web 2.0 applications created new opportunities for business. This is mainly because of the growth of social…

8902

Push and pull effects of homeland information security incentives

Kai S. Koong, Mohammad I. Merhi, Jun Sun

The purpose of this study is to find out whether efforts to improve the information security of government agencies and homeland information security have paid off and also…

1159

Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy

Costas Lambrinoudakis

The aim of the paper is to highlight gaps in compliance environments regarding information privacy and provide recommendations for global information privacy standards.

1084

Democracy, culture and information security: a case study in Zanzibar

Hussein Shaaban, Marc Conrad

The purpose of this paper is to investigate the impact of culture on information security in a developing country's view.

Resolving vulnerability identification errors using security requirements on business process models

Stefan Taubenberger, Jan Jürjens, Yijun Yu, Bashar Nuseibeh

In any information security risk assessment, vulnerabilities are usually identified by information‐gathering techniques. However, vulnerability identification errors – wrongly…

1004
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid