Table of contents
Cyber terrorism cases and stock market valuation effects
Katherine Taken Smith, Lawrence Murphy Smith, Marcus Burger, Erik S. BoyleCyber terrorism poses a serious technology risk to businesses and the economies they operate in. Cyber terrorism is a digital attack on computers, networks or digital information…
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
Giddeon Njamngang Angafor, Iryna Yevseyeva, Leandros MaglarasThis paper aims to discuss the experiences designing and conducting an experiential learning virtual incident response tabletop exercise (VIRTTX) to review a business's security…
Examining the effect of different knowledge aspects on information security awareness
Hui Na Chua, Vi Vien Khor, Siew Fan WongThe purpose of this paper is to identify the different aspects of knowledge and how they associate with information security awareness (ISA). The paper also explores how ISA…
Problems in information classification: insights from practice
Simon AnderssonThis study aims to identify problems connected to information classification in theory and to put those problems into the context of experiences from practice.
A systematic literature review of how cybersecurity-related behavior has been assessed
Kristian Kannelønning, Sokratis K. KatsikasCybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this…
Advance fee fraud scammers’ criminal expertise and deceptive strategies: a qualitative case study
Alain Tambe EbotThis study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds.
Rushing for security: a document analysis on the sources and effects of time pressure on organizational cybersecurity
Noman H. Chowdhury, Marc T.P. Adam, Timm TeubnerA growing body of research has identified time pressure as a key driver of cybersecurity (CS) risks and vulnerabilities. To strengthen CS, organizations use CS documents (e.g…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell