Information and Computer Security: Volume 30 Issue 4

Subjects:

Table of contents

How do non experts think about cyber attack consequences?

Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam E. Armstrong

Nonexperts do not always follow the advice in cybersecurity warning messages. To increase compliance, it is recommended that warning messages use nontechnical language, describe…

A systematic framework to explore the determinants of information security policy development and outcomes

Harrison Stewart

This paper aims to develop an effective information security policy (ISP), which is an important mechanism to combat insider threats.

A quantification mechanism for assessing adherence to information security governance guidelines

Ivano Bongiovanni, Karen Renaud, Humphrey Brydon, Renette Blignaut, Angelo Cavallo

Boards of Directors and other organisational leaders make decisions about the information security governance systems to implement in their companies. The increasing number of…

Toward an architecture to improve privacy and informational self-determination through informed consent

Mohamad Gharib

Most developed countries have enacted privacy laws to govern the collection and use of personal information (PI) as a response to the increased misuse of PI. Yet, these laws rely…

Key factors driving the adoption of behavioral biometrics and continuous authentication technology: an empirical research

Ioannis Stylios, Spyros Kokolakis, Olga Thanou, Sotirios Chatzis

For the success of future investments in the implementation of continuous authentication systems, we should explore the key factors that influence technology adoption. The authors…

The determinants of an information security policy compliance culture in organisations: the combined effects of organisational and behavioural factors

Eric Amankwa, Marianne Loock, Elmarie Kritzinger

This paper aims to examine the individual and combined effects of organisational and behavioural factors on employees’ attitudes and intentions to establish an information…

1302

User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina

Suncica Hadzidedic, Silvia Fajardo-Flores, Belma Ramic-Brkic

This paper aims to address the user perspective about usability, security and use of five authentication schemes (text and graphical passwords, biometrics and hardware tokens…

A game model design using test bed for Malware analysis training

Marium Khalid, Mehreen Afzal, Waseem Iqbal

This article aims to provide an interactive model for hands on training of malware analysis. Cyberwar games are the highly stylized representation of cyber conflicts in a…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell