Table of contents
Adoption of AI-integrated CRM system by Indian industry: from security and privacy perspective
Sheshadri Chatterjee, Soumya Kanti Ghosh, Ranjan Chaudhuri, Sumana ChaudhuriThe purpose of this study is to make an attempt to identify the factors responsible for the adoption of an artificial intelligence (AI)-integrated customer relationship management…
A novel approach for improving information security management and awareness for home environments
Fayez Ghazai Alotaibi, Nathan Clarke, Steven M. FurnellThe human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used…
Incorporating the human facet of security in developing systems and services
Bilal Naqvi, Nathan Clarke, Jari PorrasThe purpose of this paper is to present an integrative framework for handling the security and usability conflicts during the system development lifecycle. The framework has been…
Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach
Rohit Gupta, Baidyanath Biswas, Indranil Biswas, Shib Sankar SanaThis paper aims to examine optimal decisions for information security investments for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios…
Adapting CTF challenges into virtual cybersecurity learning environments
Stylianos Karagiannis, Emmanouil MagkosThis paper aims to highlight the potential of using capture the flag (CTF) challenges, as part of an engaging cybersecurity learning experience for enhancing skills and knowledge…
A systematic review of scales for measuring information security culture
Špela Orehek, Gregor PetričThe concept of information security culture, which recently gained increased attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on…
Users’ attitude on perceived security of enterprise systems mobility: an empirical study
Ramaraj Palanisamy, Yang WuThis study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…
Reaction of users as potential victims of information security breach
Suparak Janjarasjit, Siew H. ChanThe purpose of this study is to examine whether users’ perceived moral affect explains the effect of perceived intensity of emotional distress on responsibility judgment of a…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell