Table of contents
Information security culture – state-of-the-art review between 2000 and 2013
Fredrik Karlsson, Joachim Åström, Martin KarlssonThe aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge…
Language-independent gender identification through keystroke analysis
Ioannis Tsimperidis, Vasilios Katos, Nathan Clarke– The purpose of this paper is to investigate the feasibility of identifying the gender of an author by measuring the keystroke duration when typing a message.
Management commitment and awareness creation – ICT safety and security in electric power supply network companies
Ruth Østgaard SkotnesThis paper aims to follow-up on previous research by studying the degree of management commitment to information and communication technology (ICT) safety and security within…
Strategic cyber intelligence
Randy Borum, John Felker, Sean Kern, Kristen Dennesen, Tonya FeyesThis paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies…
Examining the effectiveness of phishing filters against DNS based phishing attacks
Swapan PurkaitThis paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly…
Investigating the work practices of network security professionals
Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Gunes Kayacik– The purpose of this paper is to investigate the work practices of network security professionals and to propose a new and robust work practices model of these professionals.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell