Table of contents
European Artificial Intelligence Act: an AI security approach
Konstantinos Kalodanis, Panagiotis Rizomiliotis, Dimosthenis AnagnostopoulosThe purpose of this paper is to highlight the key technical challenges that derive from the recently proposed European Artificial Intelligence Act and specifically, to investigate…
“…I have my dad, sister, brother, and mom’s password”: unveiling users’ mental models of security and privacy-preserving tools
Prakriti Dumaru, Ankit Shrestha, Rizu Paudel, Cassity Haverkamp, Maryellen Brunson McClain, Mahdi Nasrullah Al-AmeenThe purpose of this study is to understand user perceptions and misconceptions regarding security tools. Security and privacy-preserving tools (for brevity, the authors term them…
Do you want a secure e-wallet? Understanding the role of risk and security in e-wallet continuance intention
WeiLee Lim, Uma Thevi Munikrishnan, Choi-Meng Leong, Lee-Chea Hiew, Mei-Wei Leong, Liu YangThis study aims to explore e-wallet continuance intention in Malaysia using perceived usefulness (PU), perceived ease of use (PEU), perceived risk (PR) and perceived security…
Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach
Andreas Skalkos, Aggeliki Tsohou, Maria Karyda, Spyros KokolakisSearch engines, the most popular online services, are associated with several concerns. Users are concerned about the unauthorized processing of their personal data, as well as…
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour
Keshnee PadayacheeThis investigation serves a dual purpose: providing preliminary results and serving as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale…
Ethical hardware reverse engineering for securing the digital supply chain in critical infrastructure
Arne Roar Nygård, Sokratis K. KatsikasThis paper aims to discuss the ethical aspects of hardware reverse engineering (HRE) and propose an ethical framework for HRE when used to mitigate cyber risks of the digital…
Detecting deception in computer-mediated communication: the role of popularity information across media types
Akmal Mirsadikov, Ali Vedadi, Kent MarettWith the widespread use of online communications, users are extremely vulnerable to a myriad of deception attempts. This study aims to extend the literature on deception in…
ISSN:
2056-4961e-ISSN:
2056-497XISSN-L:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell