Information and Computer Security: Volume 29 Issue 2

Subjects:

Table of contents

Developing an information classification method

Erik Bergström, Fredrik Karlsson, Rose-Mharie Åhlfeldt

The purpose of this paper is to develop a method for information classification. The proposed method draws on established standards, such as the ISO/IEC 27002 and information…

1087

Forming digital identities in social networks: the role of privacy concerns and self-esteem

Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda

This paper aims to identify the data elements that social network sites (SNS) users consider important for shaping their digital identity and explore how users’ privacy concerns…

1006

“SME executives’ perceptions and the information security preparedness model”

Kenneth Albert Saban, Stephen Rau, Charles A. Wood

Information security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness…

A look into user privacy andthird-party applications in Facebook

Sovantharith Seng, Mahdi Nasrullah Al-Ameen, Matthew Wright

A huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a…

How social engineers use persuasion principles during vishing attacks

Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad, Akbar Siami Namin

This study aims to examine how social engineers use persuasion principles during vishing attacks.

1407

Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information

Manfred Vielberth, Ludwig Englbrecht, Günther Pernul

In the past, people were usually seen as the weakest link in the IT security chain. However, this view has changed in recent years and people are no longer seen only as a problem…

The human factor: assessing individuals’ perceptions related to cybersecurity

Susan Ramlo, John B. Nicholas

The purpose of this paper is to reveal and describe the divergent viewpoints about cybersecurity within a purposefully selected group of people with a range of expertise in…

The impact of information security initiatives on supply chain robustness and performance: an empirical study

Sindhuja P.N.

Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell