Table of contents
Privacy-preserving, user-centric VoIP CAPTCHA challenges: An integrated solution in the SIP environment
Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios KatosThis work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the…
Examining the suitability of industrial safety management approaches for information security incident management
Maria Bartnes Line, Eirik AlbrechtsenThis paper aims to discuss whether recent theoretical and practical approaches within industrial safety management might be applicable to, and solve challenges experienced in, the…
Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare
Kosmas Pipyros, Lilian Mitrou, Dimitris Gritzalis, Theodoros ApostolopoulosThe increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the…
A study on usability and security features of the Android pattern lock screen
Panagiotis Andriotis, George Oikonomou, Alexios Mylonas, Theo TryfonasThe Android pattern lock screen (or graphical password) is a popular user authentication method that relies on the advantages provided by the visual representation of a password…
The impact of repeated data breach events on organisations’ market value
Daniel Schatz, Rabih BashroushThis study aims to examine the influence of one or more information security breaches on an organisation’s stock market value as a way to benchmark the wider economic impact of…
User password repetitive patterns analysis and visualization
Xiaoying Yu, Qi LiaoPasswords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the…
Security behaviors of smartphone users
Amit Das, Habib Ullah Khan– This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell