Table of contents
The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain
Khalid Shaheen, Ali Hussein ZolaitThis study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the CTP can…
Smart home cybersecurity awareness and behavioral incentives
N’guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki KadobayashiSmart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies…
Cyber Suraksha: a card game for smartphone security awareness
Pintu Shah, Anuja AgarwalThe frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…
Experts’ feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs’ cybersecurity posture
Ruti Gafni, Yair LevyWhile data breaches are reported daily, organizations are struggling with quantifying their cybersecurity posture. This paper aims to introduce the Universal Cybersecurity…
An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices
Stephen MujeyeThis study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.
The impact of cyberattacks awareness on customers’ trust and commitment: an empirical evidence from the Pakistani banking sector
Ishtiaq Ahmad Bajwa, Shabir Ahmad, Maqsood Mahmud, Farooq Ahmad BajwaThe banking industry has always been vulnerable to cyberattacks. In recent years, Pakistan’s banking sector experienced the most intense cyberattack in its over 70-year history…
Lost in the middle – a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART)
Richard G. Mathieu, Alan E. TurovlinCyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell