Table of contents
Design and validation of a trust-based opportunity-enabled risk management system
Alessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan GuislainThe Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the…
Cloud computing assurance – a review of literature guidance
Rossouw von Solms, Melanie WillettThis paper aims to provide guidance on cloud computing assurance from an IT governance point of view. The board and executive management are tasked with ensuring proper governance…
So long, and thanks for only using readily available scripts
Hannes Holm, Teodor SommestadIt is often argued that the increased automation and availability of offensive cyber tools has decreased the skill and knowledge required by attackers. Some say that all it takes…
Privacy-preserving recommendations in context-aware mobile environments
Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, Emmanouil StiakakisThis paper aims to address privacy concerns that arise from the use of mobile recommender systems when processing contextual information relating to the user. Mobile recommender…
Must I, can I? I don’t understand your ambiguous password rules
Kristen K. Greene, Yee-Yin ChoongThe purpose of this research is to investigate user comprehension of ambiguous terminology in password rules. Although stringent password policies are in place to protect…
Auditing for privacy in threshold PKE e-voting
Aggelos Kiayias, Thomas Zacharias, Bingsheng ZhangThis paper aims to investigate the importance of auditing for election privacy via issues that appear in the state-of-the-art implementations of e-voting systems that apply…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell