Table of contents
Logical acquisition and analysis of data from android mobile devices
Himanshu Srivastava, Shashikala TapaswiThe purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…
Information security in supply chains: a management control perspective
Sindhuja P N, Anand S. KunnathurThis paper aims to discuss the need for management control system for information security management that encapsulates the technical, formal and informal systems. This motivated…
User-centred authentication feature framework
Alain Forget, Sonia Chiasson, Robert BiddleThis paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords…
An empirical test of the accuracy of an attack graph analysis tool
Teodor Sommestad, Fredrik SandströmThe purpose of this paper is to test the practical utility of attack graph analysis. Attack graphs have been proposed as a viable solution to many problems in computer network…
Towards a framework for the potential cyber-terrorist threat to critical national infrastructure: A quantitative study
Abdulrahman AlqahtaniThe main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to…
Taxonomy of technological risks of open source software in the enterprise adoption context
Mario Silic, Andrea Back, Dario Silic– The purpose of this paper is to identify the technological risks in the context of open source software (OSS) and suggest an integrative OSS risk taxonomy.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell