Table of contents
Influential factors of online fraud occurrence in retailing banking sectors from a global prospective: An empirical study of individual customers in the UK and China
Yan Sun, Ian DavidsonThis paper aims to focus on online fraud occurrence in retailing banking sectors both in the UK and China. Online financial transactions bring convenience to individuals…
Checking the manipulation checks in information security research
Kent MarettAn increasing amount of attention is being paid to the human side of information security programs, leading to research designs that require the manipulation of study variables…
A new hierarchical intrusion detection system based on a binary tree of classifiers
Ahmed Ahmim, Nacira Ghoualmi ZineThe purpose of this paper is to build a new hierarchical intrusion detection system (IDS) based on a binary tree of different types of classifiers. The proposed IDS model must…
User-visible cryptography in email and web scenarios
Phil Brooke, Richard PaigeThis paper aims to classify different types of “user-visible cryptography” and evaluate the value of user-visible cryptographic mechanisms in typical email and web scenarios for…
Security evaluation of the OAuth 2.0 framework
Eugene Ferry, John O Raw, Kevin CurranThe interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based…
An examination of factors that influence the number of information security policy violations in Qatari organizations
Hasan M. Al-Mukahal, Khaled AlshareThis paper aims to investigate factors that impact the number of information security policy violations in Qatari organizations and to examine the moderating effect of Hofstede’s…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell