Table of contents
Organisational culture, procedural countermeasures, and employee security behaviour: A qualitative study
Lena Yuryna Connolly, Michael Lang, John Gathegi, Doug J. TygarThis paper provides new insights about security behaviour in selected US and Irish organisations by investigating how organisational culture and procedural security…
Productivity vs security: mitigating conflicting goals in organizations
Peter Mayer, Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim VogtThis paper aims to contribute to the understanding of goal setting in organizations, especially regarding the mitigation of conflicting productivity and security goals.
The application of behavioural thresholds to analyse collective behaviour in information security
Dirk Snyman, Hennie KrugerThe purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.
Comparing three models to explain precautionary online behavioural intentions
Jurjen Jansen, Paul van SchaikThe purpose of this paper is to compare three social cognitive models in their ability to explain intentions of precautionary online behaviour. The models are: protection…
Managing information security awareness at an Australian bank: a comparative study
Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons, Agata McCormac, Dragana CalicThe aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other Australian industries and second…
Factors in an end user security expertise instrument
Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean CampThe purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and…
Social engineering defence mechanisms and counteracting training strategies
Peter Schaab, Kristian Beckers, Sebastian PapeThis paper aims to outline strategies for defence against social engineering that are missing in the current best practices of information technology (IT) security. Reason for the…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell