Information and Computer Security: Volume 32 Issue 1

Subjects:

Table of contents

Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps’ features and providers

Hamid Reza Nikkhah, Varun Grover, Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment

Martina Neri, Federico Niccolini, Luigi Martino

Cyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…

2154

Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives

Areej Alyami, David Sammon, Karen Neville, Carolanne Mahony

Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…

1825

Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation

Manimay Dev, Debashis Saha

This paper aims to investigate the relationship of female participation in labor force with the cybersecurity maturity of nations and the enabling role of e-government development…

Analytical hierarchy process model for managing cloud security

Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O’Sullivan

This paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes and data on…

Framework for critical information infrastructure protection in smart government: a case study in Indonesia

Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan Wibowo

This paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…

Cover of Information and Computer Security

ISSN:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell