Table of contents
Response awareness and instructional self-efficacy: influences on intent
Leigh A. MutchlerThis paper aims to examine the influence of response awareness on behavioral intent, and introduces instructional self-efficacy, a construct rarely examined within the context of…
Collaborative security risk estimation in agile software development
Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie WilliamsToday, agile software development teams in general do not adopt security risk-assessment practices in an ongoing manner to prioritize security work. Protection Poker is a…
An experimental evaluation of bow-tie analysis for security
Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm SindreWithin critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns. Because of the ever-increasing…
Identity deception detection: requirements and a model
Estee van der Walt, Jan EloffThis paper aims to describe requirements for a model that can assist in identity deception detection (IDD) on social media platforms (SMPs). The model that was discovered…
Refining the PoinTER “human firewall” pentesting framework
Jacqueline M. Archibald, Karen RenaudPenetration tests have become a valuable tool in the cyber security defence strategy in terms of detecting vulnerabilities. Although penetration testing has traditionally focussed…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell