Information and Computer Security: Volume 31 Issue 4

Subjects:

Table of contents

Cyber terrorism cases and stock market valuation effects

Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. Boyle

Cyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros Maglaras

This paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security…

Examining the effect of different knowledge aspects on information security awareness

Hui Na Chua, Vi Vien Khor, Siew Fan Wong

The purpose of this paper is to identify the different aspects of knowledge and how they associate with information security awareness (ISA). The paper also explores how ISA…

Problems in information classification: insights from practice

Simon Andersson

This study aims to identify problems connected to information classification in theory and to put those problems into the context of experiences from practice.

1261

A systematic literature review of how cybersecurity-related behavior has been assessed

Kristian Kannelønning, Sokratis K. Katsikas

Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this…

5772

Advance fee fraud scammers’ criminal expertise and deceptive strategies: a qualitative case study

Alain Tambe Ebot

This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.

Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity

Noman H. Chowdhury, Marc T.P. Adam, Timm Teubner

A growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell