Table of contents
Post hoc security and privacy concerns in mobile apps: the moderating roles of mobile apps’ features and providers
Hamid Reza Nikkhah, Varun Grover, Rajiv SabherwalThis study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…
Organizational cybersecurity readiness in the ICT sector: a quanti-qualitative assessment
Martina Neri, Federico Niccolini, Luigi MartinoCyberattacks are becoming increasingly widespread, and cybersecurity is therefore increasingly important. Although the technological aspects of cybersecurity are its best-known…
Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives
Areej Alyami, David Sammon, Karen Neville, Carolanne MahonyCyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and…
Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation
Manimay Dev, Debashis SahaThis paper aims to investigate the relationship of female participation in labor force with the cybersecurity maturity of nations and the enabling role of e-government development…
Analytical hierarchy process model for managing cloud security
Zainab Batool Rizvi, Chaudry Bilal Ahmad Khan, Michael O’SullivanThis paper aims to explore key management actions for implementing security on the cloud, which is a critical issue as many organizations are moving business processes and data on…
Framework for critical information infrastructure protection in smart government: a case study in Indonesia
Prasetyo Adi Wibowo Putro, Dana Indra Sensuse, Wahyu Setiawan Setiawan WibowoThis paper aims to develop a framework for critical information infrastructure (CII) protection in smart government, an alternative measure for common cybersecurity frameworks…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell