Table of contents
Inter-organisational information security: a systematic literature review
Fredrik Karlsson, Ella Kolkowska, Frans PrenkertThe purpose of this paper is to survey existing inter-organisational information security research to scrutinise the kind of knowledge that is currently available and the way in…
Mapping information security standard ISO 27002 to an ontological structure
Stefan Fenz, Stefanie Plieschnegger, Heidi HobelThe purpose of this paper is to increase the degree of automation within information security compliance projects by introducing a formal representation of the ISO 27002 standard…
Consumer trust in Google’s top developers’ apps: an exploratory study
Mark A. Harris, Amita G. ChinThis paper aims to investigate Google’s top developers’ apps with trust badges to see if they warrant an additional level of trust and confidence from consumers, as stated by…
Theorising on risk homeostasis in the context of information security behaviour
Wayne D. Kearney, Hennie A. KrugerThe purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.
Assessing IT disaster recovery plans: The case of publicly listed firms on Abu Dhabi/UAE security exchange
Osama El-Temtamy, Munir Majdalawieh, Lela PumphreyThis purpose of this paper is to assess information technology (IT) disaster recovery plans (DRPs) in publicly listed companies on Abu Dhabi securities exchange (ADX) in the…
Explaining small business InfoSec posture using social theories
Eli Rohn, Gilad Sabari, Guy LeshemThis study aims to investigate information technology security practices of very small enterprises.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell