Information and Computer Security: Volume 30 Issue 3

Subjects:

Table of contents

Investigating the accessibility and impacts of cybersecurity programs on high-school girls’ long-term industry engagement

Mridula Shan, Jeong Yang

The purpose of this study is to investigate whether having accessible cybersecurity programs (CPs) for high-school students affected girls’ long-term engagement with the industry…

Understanding social media users’ privacy-protection behaviors

Lori Baker-Eveleth, Robert Stone, Daniel Eveleth

This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the…

1380

Value conflicts and information security – a mixed-methods study in high-risk industry

Kristina Gyllensten, Anders Pousette, Marianne Törner

The purpose of this study is to investigate the influence of work-related value conflicts on information security in two organisations in nuclear power production and related…

Work ethic and information security behavior

Thiagarajan Ramakrishnan, Dwight M. Hite, Joseph H. Schuessler, Victor Prybutok

Information security is a growing issue that impacts organizations in virtually all industries, and data breaches impact millions of customers and cost organizations millions of…

The effect of perceived organizational culture on employees’ information security compliance

Martin Karlsson, Fredrik Karlsson, Joachim Åström, Thomas Denk

This paper aims to investigate the connection between different perceived organizational cultures and information security policy compliance among white-collar workers.

3890

Female underrepresentation in the cybersecurity workforce – a study on cybersecurity professionals in Sri Lanka

Amila Withanaarachchi, Nisansala Vithana

This study aims to identify factors impacting female underrepresentation among cybersecurity professionals in Sri Lanka.

Enterprise risk management and information technology security in the financial sector

Kwame Owusu Kwateng, Christopher Amanor, Francis Kamewor Tetteh

This study aims to empirically investigate the relationship between enterprise risk management (ERM) and information technology (IT) security within the financial sector.

1325

A multidisciplinary definition of privacy labels

Johanna Johansen, Tore Pedersen, Simone Fischer-Hübner, Christian Johansen, Gerardo Schneider, Arnold Roosendaal, Harald Zwingelberg, Anders Jakob Sivesind, Josef Noll

This paper aims to present arguments about how a complex concept of privacy labeling can be a solution to the current state of privacy.

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell