Table of contents
Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
Vasiliki Diamantopoulou, Haralambos MouratidisThe purpose of this study is the analysis of a security and privacy requirements engineering methodology. Such methodologies are considered an important part of systems’…
Using stage theorizing to make anti-phishing recommendations more effective
Alain Tambe EbotThis paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the…
Establishing information security policy compliance culture in organizations
Eric Amankwa, Marianne Loock, Elmarie KritzingerThis paper aims to establish that employees’ non-compliance with information security policy (ISP) could be addressed by nurturing ISP compliance culture through the promotion of…
A model-based approach to support privacy compliance
Majed Alshammari, Andrew SimpsonConcerns over data-processing activities that may lead to privacy violations or harms have motivated the development of legal frameworks and standards. Further, software engineers…
A grounded theory approach to security policy elicitation
Simon N. Foley, Vivien RooneyIn this paper, the authors consider how qualitative research techniques that are used in applied psychology to understand a person’s feelings and needs provides a means to elicit…
Risk-aware decision support with constrained goal models
Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew FishThe selection of security configurations for complex information systems is a cumbersome process. Decision-making regarding the choice of security countermeasures has to take into…
Designing blockchain-based SIEM 3.0 system
Natalia MiloslavskayaNowadays, to operate securely and legally and to achieve business objectives, secure valuable assets and support uninterrupted business processes, all organizations need to match…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell