Table of contents
GDPR compliance: proposed technical and organizational measures for cloud provider
Zafeiroula Georgiopoulou, Eleni-Laskarina Makri, Costas LambrinoudakisThe purpose of this paper is to give a brief guidance on what a cloud provider should consider and what further actions to take to comply with General Data Protection Regulation…
The impact of information security management practices on organisational agility
Muhamad Khairulnizam Zaini, Mohamad Noorman Masrek, Mad Khir Johari Abdullah SaniThis study aims to determine the extent to which information security management (ISM) practices impact the organisational agility by examining the relationship between both…
Constructing secure and memorable passwords
Joakim Kävrestad, Markus Lennartsson, Marcus Birath, Marcus NohlbergUsing authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the…
Security behaviour of mobile financial service users
Esther Dzidzah, Kwame Owusu Kwateng, Benjamin Kofi AsanteThe inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in…
The role of norms in information security policy compliance
Isaac Wiafe, Felix Nti Koranteng, Abigail Wiafe, Emmanuel Nyarko Obeng, Winfred YaokumahThe purpose of this paper is to determine which factors influence information system security policy compliance. It examines how different norms influence compliance intention.
A novel trust model for fog computing using fuzzy neural networks and weighted weakest link
Mhamed ZineddineTrust is one of the main pillars of many communication and interaction domains. Computing is no exception. Fog computing (FC) has emerged as mitigation of several cloud computing…
How effective are social engineering interventions? A meta-analysis
Jan-Willem Bullee, Marianne JungerSocial engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell