Information and Computer Security: Volume 24 Issue 4

Subjects:

Table of contents

An efficient intrusion detection and prevention framework for ad hoc networks

Abdelaziz Amara Korba, Mehdi Nafaa, Salim Ghanemi

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…

Stress-based security compliance model – an exploratory study

Hiep-Cong Pham, Jamal El-Den, Joan Richardson

This paper aims to extend current information security compliance research by adapting “work-stress model” of the extended Job Demands-Resources model to explore how security…

1019

Online privacy and security concerns of consumers

Anil Gurung, M.K. Raja

Privacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers…

5763

Spot the phish by checking the pruned URL

Melanie Volkamer, Karen Renaud, Paul Gerber

Phishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is…

Leveraging autobiographical memory for two-factor online authentication

Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque, Matthew Wright

Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords…

Why don’t UK citizens protest against privacy-invading dragnet surveillance?

Karen Renaud, Stephen Flowerday, Rosanne English, Melanie Volkamer

The purpose of this study was to identify to identify reasons for the lack of protest against dragnet surveillance in the UK. As part of this investigation, a study was carried…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell