Table of contents
Developing an information classification method
Erik Bergström, Fredrik Karlsson, Rose-Mharie ÅhlfeldtThe purpose of this paper is to develop a method for information classification. The proposed method draws on established standards, such as the ISO/IEC 27002 and information…
Forming digital identities in social networks: the role of privacy concerns and self-esteem
Thanos Papaioannou, Aggeliki Tsohou, Maria KarydaThis paper aims to identify the data elements that social network sites (SNS) users consider important for shaping their digital identity and explore how users’ privacy concerns…
“SME executives’ perceptions and the information security preparedness model”
Kenneth Albert Saban, Stephen Rau, Charles A. WoodInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness…
A look into user privacy andthird-party applications in Facebook
Sovantharith Seng, Mahdi Nasrullah Al-Ameen, Matthew WrightA huge amount of personal and sensitive data are shared on Facebook, which makes it a prime target for attackers. Adversaries can exploit third-party applications connected to a…
How social engineers use persuasion principles during vishing attacks
Keith S. Jones, Miriam E. Armstrong, McKenna K. Tornblad, Akbar Siami NaminThis study aims to examine how social engineers use persuasion principles during vishing attacks.
Improving data quality for human-as-a-security-sensor. A process driven quality improvement approach for user-provided incident information
Manfred Vielberth, Ludwig Englbrecht, Günther PernulIn the past, people were usually seen as the weakest link in the IT security chain. However, this view has changed in recent years and people are no longer seen only as a problem…
The human factor: assessing individuals’ perceptions related to cybersecurity
Susan Ramlo, John B. NicholasThe purpose of this paper is to reveal and describe the divergent viewpoints about cybersecurity within a purposefully selected group of people with a range of expertise in…
The impact of information security initiatives on supply chain robustness and performance: an empirical study
Sindhuja P.N.Information security is an essential element in all business activities. The damage to businesses from information security breaches has become pervasive. The scope of information…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell