Table of contents
A framework for reporting and dealing with end-user security policy compliance
Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan ClarkeIt is widely acknowledged that non-compliance of employees with information security polices is one of the major challenges facing organisations. This paper aims to propose a…
Mitigating e-services avoidance: the role of government cybersecurity preparedness
Mohamed Abdelhamid, Victoria Kisekka, Spyridon SamonasThe purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the…
A review of security assessment methodologies in industrial control systems
Qais Saif Qassim, Norziana Jamil, Maslina Daud, Ahmed Patel, Norhamadi Ja’affarThe common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape…
Forensic analysis of Google Allo messenger on Android platform
Vinayak Agrawal, Shashikala TapaswiThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this…
Customer data security and theft: a Malaysian organization’s experience
Mohd Aizuddin Zainal Abidin, Anuar Nawawi, Ahmad Saiful Azlin Puteh SalinThis study aims to identify weaknesses in current internal control systems in protecting customer data and the drivers that motivate employees to steal customer data and the…
Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills
Melissa Carlton, Yair Levy, Michelle RamimUsers’ mistakes due to poor cybersecurity skills result in up to 95 per cent of cyber threats to organizations. Threats to organizational information systems continue to result in…
Effect of long-term orientation on voluntary security actions
Salvatore Aurigemma, Thomas MattsonThis paper aims to examine the impact an individual’s long-term orientation (a cultural dimension) has on their attitude, behavioral intention and actual voluntary security…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell