Information and Computer Security
Issue(s) available: 51 – From Volume: 23 Issue: 1, to Volume: 33 Issue: 1
Volume 33
Volume 29
Volume 26
Volume 24
Cybersecurity management: an empirical analysis of dynamic capabilities framework for enhancing cybersecurity intelligence
Angelica Pigola, Priscila Rezende da CostaThe purpose of this paper is to propose a dynamic capabilities framework in cybersecurity (DCCI) and explore its potential to explain organizations’ cybersecurity intelligence…
Enhancing information security compliance behavior through knowledge interventions: insights from EEG
Zhiying Wang, Hangyu Deng, Guiyun LiThis study aims to explore the impact of information security knowledge on information security compliance behavior using neuroscience science.
Information security policy compliance: a replication study in Ethiopia
Berhanu Aebissa, Gurpreet Dhillon, Million MesheshaThis study aims to replicate and assess the applicability and generalizability of Bulgurcu et al.'s (2010) information security policy compliance model to participants from…
Health status: the pivot point in trusting smart health-care systems and providers for use
Khaled Alshare, Murad Moqbel, Maliha Alam, Moler HannaThis research aims to investigate the interplay between individuals’ health status and their level of trust in both smart health-care systems and health-care providers and how…
Addressing the necessity of cybersecurity literacy: the case of ETTCS CyberTeach project
Apostolos Xenakis, Vasileios Vlachos, Pedro Juan Roig, Salvador AlcarazThe purpose of this study is to present actions and initiatives, developed within the scope of the Empowering Teachers to Trigger Cybersecurity at Schools (ETTCS) CyberTeach…
A collaborative cybersecurity framework for higher education
Ahmed Ali Otoom, Issa Atoum, Heba Al-Harahsheh, Mahmoud Aljawarneh, Mohammed N. Al Refai, Mahmoud BakliziThe purpose of this paper is to present the educational computer emergency response team (EduCERT) framework, an integrated response mechanism to bolster national cybersecurity…
Large-scale agile security practices in software engineering
Cláudia Ascenção, Henrique Teixeira, João Gonçalves, Fernando AlmeidaSecurity in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to…
How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?
Israa Abuelezz, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled Md. Khan, Raian AliThe aim of this study is to investigate how the demographics and appearance cues of potential social engineers influence the likelihood that targets will trust them and accept…
Comparing experts’ and users’ perspectives on the use of password workarounds and the risk of data breaches
Michael J Rooney, Yair Levy, Wei Li, Ajoy KumarThe increased use of Information Systems (IS) as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password…
A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)
Joakim Kävrestad, Felicia Burvall, Marcus NohlbergDeveloping cybersecurity awareness (CSA) is becoming a more and more important goal for modern organizations. CSA is a complex sociotechnical system where social, technical and…
Understanding the factors that motivate South African home fibre users to protect their home networking devices: a protection motivation theory
Luzuko Tekeni, Reinhardt A. BothaAs home users are increasingly responsible for securing their computing devices and home networks, there is a growing need to develop interventions to assist them in protecting…
The effects of persuasion principles on perceived honesty during shoulder surfing attacks
Keith S. Jones, McKenna K. Tornblad, Miriam E. Armstrong, Jinwoo Choi, Akbar Siami NaminThis study aimed to investigate how honest participants perceived an attacker to be during shoulder surfing scenarios that varied in terms of which Principle of Persuasion in…
Understanding information security awareness: evidence from the public healthcare sector
Martina Neri, Elisabetta Benevento, Alessandro Stefanini, Davide Aloini, Federico Niccolini, Annalaura Carducci, Ileana Federigi, Gianluca DiniInformation security awareness (ISA) mainly refers to those aspects that need to be addressed to effectively respond to information security challenges. This research used focus…
Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace
Kristiina Ahola, Marcus Butavicius, Agata McCormac, Daniel SturmanCyber security incidents pose a major threat to organisations. Reporting cyber security incidents and providing organisations with information about their true nature, type and…
Expressing opinions about information security in an organization: the spiral of silence theory perspective
Gregor Petrič, Špela OrehekExpressing views on organizational information security (IS) by employees is vital for improving security processes, policies and trainings, while non-communication may conceal…
Trends and challenges in research into the human aspects of ransomware: a systematic mapping study
Garret Murray, Malin Falkeling, Shang GaoThe purpose of this paper is to provide an overview of the trends and challenges relating to research into the human aspects of ransomware.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell