Information and Computer Security: Volume 31 Issue 5

Subjects:

Table of contents

The impacts of the cyber-trust program on the cybersecurity maturity of government entities in the Kingdom of Bahrain

Khalid Shaheen, Ali Hussein Zolait

This study aims to determine the impacts of the Bahrain Government framework [cyber-trust program (CTP)] on the cybersecurity maturity of government entities and how the CTP can…

Smart home cybersecurity awareness and behavioral incentives

N’guessan Yves-Roland Douha, Karen Renaud, Yuzo Taenaka, Youki Kadobayashi

Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studies…

Cyber Suraksha: a card game for smartphone security awareness

Pintu Shah, Anuja Agarwal

The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the…

Experts’ feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs’ cybersecurity posture

Ruti Gafni, Yair Levy

While data breaches are reported daily, organizations are struggling with quantifying their cybersecurity posture. This paper aims to introduce the Universal Cybersecurity…

An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices

Stephen Mujeye

This study aims to investigate the differences in security-conscious (group A) and regular (group B) users’ behaviors and practices on mobile devices.

The impact of cyberattacks awareness on customers’ trust and commitment: an empirical evidence from the Pakistani banking sector

Ishtiaq Ahmad Bajwa, Shabir Ahmad, Maqsood Mahmud, Farooq Ahmad Bajwa

The banking industry has always been vulnerable to cyberattacks. In recent years, Pakistan’s banking sector experienced the most intense cyberattack in its over 70-year history…

Lost in the middle – a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART)

Richard G. Mathieu, Alan E. Turovlin

Cyber risk has significantly increased over the past twenty years. In many organizations, data and operations are managed through a complex technology stack underpinned by an…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell