Table of contents - Special Issue: Selected Papers from the HAISA 2007 Symposium
Guest Editors: Professor Steven Furnell, Dr Nathan Clarke
Comply! Resistance is futile
Themistokles LazaridesThe goal of the paper is to detect any gaps in the legislator's and practitioner's approaches in information systems design and implementation and to evaluate their impact on an…
Vendor availability: a key factor for outsourcing in Chilean ICT sector
Ranjan B. KiniCurrently, in various reports, Chile has been receiving better rankings than other Latin American countries, identifying it as a nation for offshoring many of the business process…
How well are information risks being communicated to your computer end‐users?
Malcolm R. Pattinson, Grantley AndersonThe aim of this paper is, first, to discuss how the risk perceptions of computer end‐users may be influenced by improving the process of risk communication by embedding symbols…
User‐centred security applied to the development of a management information system
Marcus Nohlberg, Johannes BäckströmThis paper aims to use user‐centred security development of a prototype graphical interface for a management information system dealing with information security with upper‐level…
Improving protection mechanisms by understanding online risk
Shirley Atkinson, Chris Johnson, Andy PhippenThe purpose of this research is to examine privacy risks for two groups of individuals for whom privacy is an important issue. Understanding the risks to vulnerable groups leads…
Usable set‐up of runtime security policies
Almut Herzog, Nahid ShahmehriThis paper aims to present concrete and verified guidelines for enhancing the usability and security of software that delegates security decisions to lay users and captures these…
Toward viable information security reporting systems
Finn Olav Sveen, Jose M. Sarriegi, Eliot Rich, Jose J. GonzalezThis research paper aims to examine how incident‐reporting systems function and particularly how the steady growth of high‐priority incidents and the semi‐exponential growth of…
On the imbalance of the security problem space and its expected consequences
Konstantin Beznosov, Olga BeznosovaThis paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the…