Information and Computer Security
Issue(s) available: 46 – From Volume: 23 Issue: 1, to Volume: 32 Issue: 1
Investigation on information security awareness based on KAB model: the moderating role of age and education level
Binh Huu Nguyen, Huong Nguyen Quynh LeThis study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning…
An assessment of critical success factors in information security implementation in organizations in Ghana
Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam, Abubakar Gbambegu UmarThis paper aims to identify the critical success factors in improving information security in Ghanaian firms.
Cybersecurity in modern cars: awareness and readiness of auto workshops
David Hedberg, Martin Lundgren, Marcus NohlbergThis study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour
Keshnee PadayacheeThis investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…
Getting users to click: a content analysis of phishers’ tactics and techniques in mobile instant messaging phishing
Rufai Ahmad, Sotirios Terzis, Karen RenaudThis study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.
Exploring the critical success factors of information security management: a mixed-method approach
Hao Chen, Yuge HaiEffective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…
Human factors and cyber-security risks on the railway – the critical role played by signalling operations
Eylem Thron, Shamal Faily, Huseyin Dogan, Martin FreerRailways are a well-known example of complex critical infrastructure, incorporating socio-technical systems with humans such as drivers, signallers, maintainers and passengers at…
Detecting deception in computer-mediated communication: the role of popularity information across media types
Akmal Mirsadikov, Ali Vedadi, Kent MarettWith the widespread use of online communications, users are extremely vulnerable to a myriad of deception attempts. This study aims to extend the literature on deception in…
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure
Arne Roar Nygård, Sokratis K. KatsikasThis paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital…
European Artificial Intelligence Act: an AI security approach
Konstantinos Kalodanis, Panagiotis Rizomiliotis, Dimosthenis AnagnostopoulosThe purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate…
“…I have my dad, sister, brother, and mom’s password”: unveiling users’ mental models of security and privacy-preserving tools
Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain, Mahdi Nasrullah Al-AmeenThe purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
Andreas Skalkos, Aggeliki Tsohou, Maria Karyda, Spyros KokolakisSearch engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…
Informational inequality: the role of resources and attributes in information security awareness
Gregory LyonThe rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention
WeiLee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew, Mei-Wei Leong, Liu YangThis study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security…
Organizational perspectives on converged security operations
Herbert Mattord, Kathleen Kotwica, Michael Whitman, Evan BattagliaThe purpose of this paper is to explore the current practices in security convergence among and between corporate security and cybersecurity processes in commercial enterprises.
Determining cybersecurity culture maturity and deriving verifiable improvement measures
Peter Dornheim, Ruediger ZarnekowThe human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…
Applying the Goal, Question, Metric method to derive tailored dynamic cyber risk metrics
Miguel Calvo, Marta BeltránThis paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Exploring the role of assurance context in system security assurance evaluation: a conceptual model
Shao-Fang Wen, Basel KattSecurity assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell