Table of contents
An empirical investigation of the factors that influence Internet user’s ability to correctly identify a phishing website
Swapan Purkait, Sadhan Kumar De, Damodar SuarThe aim of this study is to report on the results of an empirical investigation of the various factors which have significant impacts on the Internet user’s ability to correctly…
Information security governance implementation within Ghanaian industry sectors: An empirical study
Winfred YaokumahThe purpose of this study is to assess the levels of information security governance (ISG) implementation among major Ghanaian industry sectors. The intent is to benchmark…
A holistic cyber security implementation framework
Issa Atoum, Ahmed Otoom, Amer Abu AliThe purpose of this paper is to propose a holistic cyber security implementation framework (HCS-IF) that lays out the ground for a conceptual, coherent, systematic, overarching…
A cyclical evaluation model of information security maturity
Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos, Carlos Becker WestphallThis paper aims at presenting a cyclical evaluation model of information security (IS) maturity. The lack of a security evaluation method might expose organizations to several…
Information security: Critical review and future directions for research
Mario Silic, Andrea Back– The purpose of this literature review is to analyze current trends in information security and suggest future directions for research.
A secure portable execution environment to support teleworking
Peter James, Don GriffithsThis paper presents the design, development and trialling of the mobile execution environment (MEE), a secure portable execution environment designed to support secure…