Information and Computer Security: Volume 24 Issue 1

Subjects:

Table of contents

Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment

Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos

This work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the…

Examining the suitability of industrial safety management approaches for information security incident management

Maria Bartnes Line, Eirik Albrechtsen

This paper aims to discuss whether recent theoretical and practical approaches within industrial safety management might be applicable to, and solve challenges experienced in, the…

3784

Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare

Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, Theodoros Apostolopoulos

The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the…

2379

A study on usability and security features of the Android pattern lock screen

Panagiotis Andriotis, George Oikonomou, Alexios Mylonas, Theo Tryfonas

The Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password…

1012

The impact of repeated data breach events on organisations’ market value

Daniel Schatz, Rabih Bashroush

This study aims to examine the influence of one or more information security breaches on an organisation’s stock market value as a way to benchmark the wider economic impact of…

2173

User password repetitive patterns analysis and visualization

Xiaoying Yu, Qi Liao

Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the…

1984

Security behaviors of smartphone users

Amit Das, Habib Ullah Khan

– This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.

3675
Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell