Information and Computer Security: Volume 24 Issue 5

Subjects:

Table of contents

Inter-organisational information security: a systematic literature review

Fredrik Karlsson, Ella Kolkowska, Frans Prenkert

The purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in…

1534

Mapping information security standard ISO 27002 to an ontological structure

Stefan Fenz, Stefanie Plieschnegger, Heidi Hobel

The purpose of this paper is to increase the degree of automation within information security compliance projects by introducing a formal representation of the ISO 27002 standard…

1505

Consumer trust in Google’s top developers’ apps: an exploratory study

Mark A. Harris, Amita G. Chin

This paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by…

Theorising on risk homeostasis in the context of information security behaviour

Wayne D. Kearney, Hennie A. Kruger

The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.

Assessing IT disaster recovery plans: The case of publicly listed firms on Abu Dhabi/UAE security exchange

Osama El-Temtamy, Munir Majdalawieh, Lela Pumphrey

This purpose of this paper is to assess information technology (IT) disaster recovery plans (DRPs) in publicly listed companies on Abu Dhabi securities exchange (ADX) in the…

Explaining small business InfoSec posture using social theories

Eli Rohn, Gilad Sabari, Guy Leshem

This study aims to investigate information technology security practices of very small enterprises.

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell