Table of contents
Information security management and the human aspect in organizations
Harrison Stewart, Jan JürjensThe aim of this study is to encourage management boards to recognize that employees play a major role in the management of information security. Thus, these issues need to be…
Understanding of e-service security dimensions and its effect on quality and intention to use
Hamed TaherdoostSecurity has been a critical matter in the development of electronic services. The purpose of this research is to develop a new model to help e-service practitioners and…
Measuring attitude towards personal data for adaptive cybersecurity
Joyce Hoese Addae, Michael Brown, Xu Sun, Dave Towey, Milena RadenkovicThis paper presents an initial development of a personal data attitude (PDA) measurement instrument based on established psychometric principles. The aim of the research was to…
Escalation of commitment and information security: theories and implications
Dmitriy V. ChulkovThis study aims to explore the challenges that the escalation of commitment poses to information security.
Spear phishing in organisations explained
Jan-Willem Bullee, Lorena Montoya, Marianne Junger, Pieter HartelThe purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Incorporating privacy in the design of cloud-based systems: a conceptual meta-model
Christos KalloniatisThe purpose of this paper is to extend PriS (privacy safeguard), a privacy requirements engineering method for eliciting and modelling privacy requirements during system design…
To cloud or not to cloud: how risks and threats are affecting cloud adoption decisions
Takahiko Kajiyama, Murray Jennex, Theophilus AddoThis paper aims to discover factors that are truly affecting cloud adoption decisions in organizations. Many reasons have been given for the adoption, or lack thereof, of the…
![Cover of Information and Computer Security](/insight/proxy/containerImg?link=/resource/publication/issue/0be67ec87a143e2f6872b160065622b4/urn:emeraldgroup.com:asset:id:binary:ics.cover.jpg)
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell