Table of contents - Special Issue: Human Aspects of Security
Guest Editors: Steven Furnell, Nathan Clarke
Persuading end users to act cautiously online: a fear appeals study on phishing
Jurjen Jansen, Paul van SchaikThe purpose of this paper is to test the protection motivation theory (PMT) in the context of fear appeal interventions to reduce the threat of phishing attacks. In addition, it…
The effect of resilience and job stress on information security awareness
Agata McCormac, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Meredith LillieThe purpose of this study was to investigate the relationship between resilience, job stress and information security awareness (ISA). The study examined the effect of resilience…
I shall, we shall, and all others will: paradoxical information security behaviour
Dirk P. Snyman, Hennie Kruger, Wayne D. KearneyThe purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.
Identifying and predicting the factors affecting end-users’ risk-taking behavior
Manal Alohali, Nathan Clarke, Fudong Li, Steven FurnellThe end-user has frequently been identified as the weakest link; however, motivated by the fact that different users react differently to the same stimuli, identifying the reasons…
In their own words: employee attitudes towards information security
Debi AshendenThe purpose of this study is to uncover employee attitudes towards information security and to address the issue of social acceptability bias in information security research.
An information privacy culture instrument to measure consumer privacy expectations and confidence
Adéle Da VeigaThis paper aims to propose an information privacy culture index framework (IPCIF) with a validated information privacy culture index instrument (IPCII) to measure information…
Security questions education: exploring gamified features and functionalities
Nicholas Micallef, Nalin Asanka Gamagedara ArachchilageSecurity questions are one of the techniques used to recover forgotten passwords. However, security questions have both security and memorability limitations. To limit their…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell