Table of contents
Current challenges in information security risk management
Stefan Fenz, Johannes Heurix, Thomas Neubauer, Fabian PechsteinThe purpose of this paper is to give an overview of current risk management approaches and outline their commonalities and differences, evaluate current risk management approaches…
Using response action with intelligent intrusion detection and prevention system against web application malware
Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat, Mamoun AlazabThe purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most…
Impact of information security initiatives on supply chain performance: An empirical investigation
Sindhuja PNThe purpose of this empirical research is to attempt to explore the effect of information security initiatives (ISI) on supply chain performance, considering various intra- and…
Security culture and the employment relationship as drivers of employees’ security compliance
John D'Arcy, Gwen GreeneThe purpose of this paper is to examine the influence of security-related and employment relationship factors on employees’ security compliance decisions. A major challenge for…
Repairing trust in an e-commerce and security context: an agent-based modeling approach
Jae Choi, Derek L. NazarethThe aim of this paper is to study the critical role of trust in electronic commerce extensively in the context of establishing initial trust between trading partners. Ongoing…
Teaching information security management: reflections and experiences
Atif Ahmad, Sean MaynardThe purpose of this paper is to describe the development, design, delivery and evaluation of a postgraduate information security subject that focuses on a managerial, rather than…