Table of contents
Assessing the information quality of phishing-related content on financial institutions’ websites
Rika Butler, Martin ButlerPhishing attacks exploit social vulnerabilities and remain a global concern. Financial institutions often use their websites as part of their online awareness and education…
Work-related groups and information security policy compliance
Teodor SommestadIt is widely acknowledged that norms and culture influence decisions related to information security. The purpose of this paper is to investigate how work-related groups influence…
Ontology-based information security compliance determination and control selection on the example of ISO 27002
Stefan Fenz, Thomas NeubauerThe purpose of this paper is to provide a method to formalize information security control descriptions and a decision support system increasing the automation level and…
Information security practice in Saudi Arabia: case study on Saudi organizations
Zakarya A. AlzamilInformation security of an organization is influenced by the deployed policy and procedures. Information security policy reflects the organization’s attitude to the protection of…
An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture
Adéle Da VeigaEmployee behaviour is a continuous concern owing to the number of information security incidents resulting from employee behaviour. The purpose of this paper is to propose an…
MMSPhiD: a phoneme based phishing verification model for persons with visual impairments
Gunikhan Sonowal, KS KuppusamyThis paper aims to propose a model entitled MMSPhiD (multidimensional similarity metrics model for screen reader user to phishing detection) that amalgamates multiple approaches…
Impact of cyberattacks on stock performance: a comparative study
Samuel Tweneboah-Kodua, Francis Atsu, William BuchananThe study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period from January 03, 2013, to December 29, 2017.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell