Information and Computer Security: Volume 25 Issue 2

Subjects:

Table of contents

Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study

Lena Yuryna Connolly, Michael Lang, John Gathegi, Doug J. Tygar

This paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security…

2161

Productivity vs security: mitigating conflicting goals in organizations

Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt

This paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.

The application of behavioural thresholds to analyse collective behaviour in information security

Dirk Snyman, Hennie Kruger

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

Comparing three models to explain precautionary online behavioural intentions

Jurjen Jansen, Paul van Schaik

The purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection…

Managing information security awareness at an Australian bank: a comparative study

Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic

The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries and second…

Factors in an end user security expertise instrument

Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp

The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and…

1241

Social engineering defence mechanisms and counteracting training strategies

Peter Schaab, Kristian Beckers, Sebastian Pape

This paper aims to outline strategies for defence against social engineering that are missing in the current best practices of information technology (IT) security. Reason for the…

1946
Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell