Information and Computer Security: Volume 30 Issue 2

Subjects:

Table of contents

An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality

Jan-Halvard Bergquist, Samantha Tinet, Shang Gao

The purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.

2150

Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process

Benjamin K. Ngugi, Kuo-Ting Hung, Yuanxiang John Li

Tax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The…

From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden

Ana Faizi, Ali Padyab, Andreas Naess

This study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.

1834

The hindrance of cloud computing acceptance within the financial sectors in Germany

Harrison Stewart

The purpose of this study is to develop a model called “IaaS adoption” to identify the various challenges and precise implications that hinder the adoption of infrastructure as a…

Cybersecurity educational games: a theoretical framework

Mark I. Hwang, Susan Helser

Computer games that teach cybersecurity concepts have been developed to help both individuals and organizations shore up their defence against cybercrimes. Evidence of the…

BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes

Ioannis Stylios, Spyros Kokolakis, Andreas Skalkos, Sotirios Chatzis

The purpose of this paper is to present a new paradigm, named BioGames, for the extraction of behavioral biometrics (BB) conveniently and entertainingly. To apply the BioGames…

Cybersecurity capabilities for critical infrastructure resilience

Masike Malatji, Annlizé L. Marnewick, Suné Von Solms

For many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to…

1997

Usability of the login authentication process: passphrases and passwords

Bhaveer Bhana, Stephen Vincent Flowerday

The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell