Table of contents
A cyber-threat analytic model for autonomous detection of virtual property theft
Nicholas Patterson, Michael Hobbs, Tianqing ZhuThe purpose of this study is to provide a framework to detect and prevent virtual property theft in virtual world environments. The issue of virtual property theft is a serious…
State transgression on electronic expression: is it for real?
Argha Ray, Anjali KaushikCyberspace is a virtual environment where instantaneous communications are initiated and consumed using computer networks without any natural or artificial boundaries. These…
Workarounds and trade-offs in information security – an exploratory study
Rogier WoltjerThe purpose of this paper is to investigate relationships between workarounds (solutions to handling trade-offs between competing or misaligned goals and gaps in policies and…
Deterrence and punishment experience impacts on ISP compliance attitudes
Salvatore Aurigemma, Thomas MattsonThe paper aims to examine the inconclusive impacts of sanction-related deterrence on employee information security policy (ISP) compliance from the extant literature. It proposes…
Human-centered authentication guidelines
Jeremiah D. Still, Ashley Cain, David SchusterDespite the widespread use of authentication schemes and the rapid emergence of novel authentication schemes, a general set of domain-specific guidelines has not yet been…
On data leakage from non-production systems
Jacqueline Cope, Francois Siewe, Feng Chen, Leandros Maglaras, Helge JanickeThis study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production…
A systematic approach to investigating how information security and privacy can be achieved in BYOD environments
Abubakar Garba Bello, David Murray, Jocelyn ArmaregoThis paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell