Table of contents
Evaluating user susceptibility to phishing attacks
Sanchari Das, Christena Nippert-Eng, L. Jean CampPhishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data…
An improved feature extraction algorithm for insider threat using hidden Markov model on user behavior detection
Xiaoyun Ye, Myung-Mook HanBy using a new feature extraction method on the Cert data set and using a hidden Markov model (HMM) to model and analyze the behavior of users to distinguish whether the behavior…
To click or not to click the link: the factors influencing internet banking users’ intention in responding to phishing emails
Suganthi Manoharan, Norliza Katuk, Syahida Hassan, Rahayu AhmadDespite internet banking’s popularity, there is a rise in phishing attacks related to online banking transactions. Phishing attacks involved the process of sending out electronic…
Response to a phishing attack: persuasion and protection motivation in an organizational context
Piers Bayl-Smith, Ronnie Taib, Kun Yu, Mark WigginsThis study aims to examine the effect of cybersecurity threat and efficacy upon click-through, response to a phishing attack: persuasion and protection motivation in an…
The impact of general data protection regulation on software engineering practices
Luís Leite, Daniel Rodrigues dos Santos, Fernando AlmeidaThis paper aims to explore the changes imposed by the general data protection regulation (GDPR) on software engineering practices. The fundamental objective is to have a…
How different rewards tend to influence employee non-compliance with information security policies
Rima Khatib, Henri BarkiTo help reduce the increasing number of information security breaches that are caused by insiders, past research has examined employee non-compliance with information security…
To sell, or not to sell: social media data-breach in second-hand Android devices
Oussama BenRhouma, Ali AlZahrani, Ahmad AlKhodre, Abdallah Namoun, Wasim Ahmad BhatThe purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android…
Cyberattacks against the health-care sectors during the COVID-19 pandemic
Ruti Gafni, Tal PavelThis paper aims to analyze the changes in cyberattacks against the health-care sector during the COVID-19 pandemic.
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell