Table of contents
A framework to assist email users in the identification of phishing attacks
André Lötter, Lynn FutcherThe purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible…
Privacy as a secondary goal problem: an experiment examining control
Thomas Hughes-RobertsThe purpose of this paper is to report on results of an investigation into the impact of adding privacy salient information (defined through the theory of planned behaviour) into…
Reengineering the user: privacy concerns about personal data on smartphones
Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos, Lilian MitrouThis paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not…
Exploring the relationship between student mobile information security awareness and behavioural intent
Bukelwa Ngoqo, Stephen V. FlowerdayThe purpose of this paper was to analyse existing theories from the social sciences to gain a better understanding of factors which contribute to student mobile phone users’ poor…
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking
Martin Butler, Rika ButlerThe purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk…
Engaging stakeholders during late stage security design with assumption personas
Shamal FailyThis paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late stage of a…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell