Table of contents
Gender differences in predictors of technology threat avoidance
Andrew R. Gillam, Alina M. WaiteThe purpose of this paper is to examine gender differences in predictors of technology threat avoidance motivation and behavior among working US adults. Implications were…
Understanding the disclosure of personal data online
Heather J. Parker, Stephen FlowerdaySocial media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at…
Cyberbullying and cyber-mobbing in developing countries
Aliya Kintonova, Alexander Vasyaev, Viktor ShestakThis paper aims to consider modern internet phenomena such as cyberbullying and cybermobbing. The emphasis in the paper is placed on the problematic issues of the legal practice…
A collaborative approach for national cybersecurity incident management
Oluwafemi Oriola, Adesesan Barnabas Adeyemo, Maria Papadaki, Eduan KotzéCollaborative-based national cybersecurity incident management benefits from the huge size of incident information, large-scale information security devices and aggregation of…
Cybersecurity advocates: discovering the characteristics and skills of an emergent role
Julie M. Haney, Wayne G. LuttersCybersecurity advocates safeguard their organizations by promoting security best practices. This paper aims to describe the skills and characteristics of successful advocates.
After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations
Atiya AveryThis study aims to evaluate changes to the financial performance of organizations in the 1–4 quarters following a data breach event. The study introduces two new variables…
The “three M’s” counter-measures to children’s risky online behaviors: mentor, mitigate and monitor
Karen Renaud, Suzanne PriorThe purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers…
Do privacy concerns determine online information disclosure? The case of internet addiction
Nik Thompson, Atif Ahmad, Sean MaynardIt is a widely held belief that users make a rational cost-benefit decision when choosing whether to disclose information online. Yet, in the privacy context, the evidence is far…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell