Information and Computer Security: Volume 28 Issue 1

Subjects:

Table of contents

Matching training to individual learning styles improves information security awareness

Malcolm Pattinson, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormac

This paper aims to introduce the concept of a framework of cyber-security controls that are adaptable to different types of organisations and different types of employees. One of…

1396

Mobile agent-based SIEM for event collection and normalization externalization

Nabil Moukafih, Ghizlane Orhanou, Said Elhajji

This paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and…

Evaluating privacy impact assessment methods: guidelines and best practice

Konstantina Vemou, Maria Karyda

This paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and…

The cyber-insurance market in Norway

Hayretdin Bahşi, Ulrik Franke, Even Langfeldt Friberg

This paper aims to describe the cyber-insurance market in Norway but offers conclusions that are interesting to a wider audience.

Requirements for private communications over public spheres

Konstantina Vemou, Maria Karyda

In the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private…

Patient use of online medical records: an application of technology acceptance framework

Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter, Brian J. Reithel

Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy…

AppAware: a policy visualization model for mobile applications

Ioannis Paspatis, Aggeliki Tsohou, Spyros Kokolakis

Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell