Information and Computer Security: Volume 31 Issue 3

Subjects:

Table of contents

Risk homeostasis and security fatigue: a case study of data specialists

Anusha Bhana, Jacques Ophoff

Organisations use a variety of technical, formal and informal security controls but also rely on employees to safeguard information assets. This relies heavily on compliance and…

A model for information security culture with creativity and innovation as enablers – refined with an expert panel

Adéle Da Veiga

This study aims to elicit an understanding of creativity and innovation to enable a totally aligned information security culture. A model is proposed to encourage creativity and…

How privacy concerns impact Swedish citizens’ willingness to report crimes: a quantitative mobile phone survey

Gunnar Lindqvist, Joakim Kävrestad

The purpose of this paper is to identify whether there is a lower willingness to report a crime if a victim must hand in their mobile phone as evidence. If that is the case, the…

Improving cybersecurity skill development through visual programming

Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul

Cybersecurity training plays a decisive role in overcoming the global shortage of cybersecurity experts and the risks this shortage poses to organizations' assets. Seeking to make…

Policy components – a conceptual model for modularizing and tailoring of information security policies

Elham Rostami, Fredrik Karlsson, Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1202

An exploration of Australian attitudes towards privacy

Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, Michael Crowley

Using technology to meet national security expectations and requirements is not new. Nations attempt to strike a balance between security and the (expressed or otherwise) privacy…

Enhancing the design of data-related privacy controls for smart home devices

Chola Chhetri, Vivian Genaro Motti

Past research shows that users of smart home devices (SHDs) have privacy concerns. These concerns have been validated from technical research that shows SHDs introduce a lot of…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell