Table of contents
Cybersecurity and information security – what goes where?
Basie von Solms, Rossouw von SolmsThe purpose of this paper is to define cybersecurity and cybersecurity governance in simplified terms – to explain to the boards of directors and executive management their…
A process model for implementing information systems security governance
Mathew NichoThe frequent and increasingly potent cyber-attacks because of lack of an optimal mix of technical as well as non-technical IT controls has led to increased adoption of security…
A utilitarian re-examination of enterprise-scale information security management
Andrew StewartAn action is utilitarian when it is both useful and practical. This paper aims to examine a number of traditional information security management practices to ascertain their…
Transforming information security governance in India (A SAP-LAP based case study of security, IT policy and e-governance)
Rashmi Anand, Sanjay Medhavi, Vivek Soni, Charru Malhotra, D.K. BanwetDigital India, the flagship programme of Government of India (GoI) originated from National e-Governance Project (NeGP) in the year 2014. The programme has important aspect of…
Information security policy compliance: a higher education case study
Khaled A. Alshare, Peggy L. Lane, Michael R. LaneThe purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on…
Data security and consumer trust in FinTech innovation in Germany
Harrison Stewart, Jan JürjensThe purpose of this study is to empirically analyse the key factors that influence the adoption of financial technology innovation in the country Germany. The advancement of…
Employee fraud and misconduct: empirical evidence from a telecommunication company
Anuar Nawawi, Ahmad Saiful Azlin Puteh SalinThe purpose of this study is to examine whether policies and procedures, one of the fundamental elements in the internal control environment, are adequate and effective in…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell