Table of contents
A longitudinal analysis of data breaches
Chlotia Posey Garrison, Matoteng NcubeThe purpose of this research is to provide companies and consumers with information about the potential connections between data breach types and institutions. This study also…
A quantitative evaluation of vulnerability scanning
Hannes Holm, Teodor Sommestad, Jonas Almroth, Mats PerssonThe purpose of this paper is to evaluate if automated vulnerability scanning accurately identifies vulnerabilities in computer networks and if this accuracy is contingent on the…
Enhancing SSADM with disaster recovery plan activities
George Aggelinos, Sokratis K. KatsikasThe purpose of this paper is to propose the integration of disaster recovery plan (DRP) objects development activities with the activities of the structured system analysis and…
Shaping security behaviour through discipline and agility: Implications for information security management
Dan Harnesk, John LindströmThe purpose of this paper is to broaden the understanding about security behaviour by developing a security behaviour typology based on the concepts of discipline and agility.