Information and Computer Security: Volume 32 Issue 5

Subjects:

Table of contents

Exploring the critical success factors of information security management: a mixed-method approach

Hao Chen, Yuge Hai

Effective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…

Investigation on information security awareness based on KAB model: the moderating role of age and education level

Binh Huu Nguyen, Huong Nguyen Quynh Le

This study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning…

Bridging knowledge gap: the contribution of employees’ awareness of AI cyber risks comprehensive program to reducing emerging AI digital threats

Amir Schreiber, Ilan Schreiber

In the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…

Mining Reddit users’ perspectives on cybersecurity competitions: a mixed method approach

Chen Zhong, Hong Liu, Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

87

Optimism bias in susceptibility to phishing attacks: an empirical study

Morné Owen, Stephen V. Flowerday, Karl van der Schyff

Researchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this…

Regulating digital security by design? Implications of the perspectives from DSbD programme stakeholders

Ian Slesinger, Niki Panteli, Lizzie Coles-Kemp

As part of the growing necessity for inter-organisational and multi-disciplinary interaction to facilitate complex innovation in digital security, there needs to be greater…

Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic Review

Rodney Adriko, Jason R.C. Nurse

This study aims to offer insights into the state of research covering cybersecurity, cyber insurance and small- to medium-sized enterprises (SMEs). It examines benefits of…

The role of artificial intelligence (AI) in improving technical and managerial cybersecurity tasks’ efficiency

Ruti Gafni, Yair Levy

Artificial intelligence (AI) can assist in the worldwide shortage of cybersecurity workers in technical and managerial roles. Thus, the purpose of this study was to investigate…

Factors that influence secure behaviour while using mobile digital devices

Marcel Spruit, Deborah Oosting, Celine Kreffer

The use of mobile digital devices requires secure behaviour while using these devices. To influence this behaviour, one should be able to adequately measure the behaviour. The…

Cover of Information and Computer Security

ISSN:

2056-4961

e-ISSN:

2056-497X

ISSN-L:

2056-4961

Online date, start – end:

2015

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Prof Steven Furnell