Table of contents
Key elements of an information security culture in organisations
Frans Nel, Lynette DrevinThe purpose of this paper is to report on a study that investigated the information security culture in organisations in South Africa, with the aim of identifying key aspects of…
Security monitoring and information security assurance behaviour among employees: An empirical analysis
Zauwiyah Ahmad, Thian Song Ong, Tze Hui Liew, Mariati NorhashimThe purpose of this research is to explain the influence of information security monitoring and other social learning factors on employees’ security assurance behaviour. Security…
Cloud privacy objectives a value based approach
David Lewis Coss, Gurpreet DhillonTo effectively develop privacy policies and practices for cloud computing, organizations need to define a set of guiding privacy objectives that can be applied across their…
The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language
Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham, Fatimah AlkhudhayrNowadays, there is a high demand for online services and applications. However, there is a challenge to keep these applications secured by applying different methods rather than…
Socio-technical systems cybersecurity framework
Masike Malatji, Sune Von Solms, Annlizé MarnewickThis paper aims to identify and appropriately respond to any socio-technical gaps within organisational information and cybersecurity practices. This culminates in the equal…
Actionable threat intelligence for digital forensics readiness
Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis, George J. PangalosThe purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of…
A survey on the Internet of Things security: State-of-art, architecture, issues and countermeasures
Omerah Yousuf, Roohie Naaz MirInternet of Things (IoT) is a challenging and promising system concept and requires new types of architectures and protocols compared to traditional networks. Security is an…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell