Information and Computer Security
Issue(s) available: 48 – From Volume: 23 Issue: 1, to Volume: 32 Issue: 3
Volume 29
Volume 26
Volume 24
Optimism bias in susceptibility to phishing attacks: an empirical study
Morné Owen, Stephen V. Flowerday, Karl van der SchyffResearchers looking for ways to change the insecure behaviour that results in phishing have considered multiple possible reasons for such behaviour. Therefore, the purpose of this…
Mining Reddit users’ perspectives on cybersecurity competitions: a mixed method approach
Chen Zhong, Hong Liu, Hwee-Joo KamCybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…
What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
Marcus Gerdin, Ella Kolkowska, Åke GrönlundResearch on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research…
Information security policy effectiveness: a managerial perspective of the financial industry in Vietnam
Thai Pham, Farkhondeh HassandoustInformation security (InfoSec) policy violations are of great concern to all organisations worldwide, especially in the financial industry. Although the importance of InfoSec…
Human factors in remote work: examining cyber hygiene practices
Tuğçe Karayel, Bahadır Aktaş, Adem AkbıyıkThe purpose of this paper is to investigate the cyber hygiene practices of remote workers.
Investigation on information security awareness based on KAB model: the moderating role of age and education level
Binh Huu Nguyen, Huong Nguyen Quynh LeThis study aims to investigate the moderating role of sociodemographic factors, specifically age and education level, in the knowledge-attitude-behavior (KAB) model concerning…
Qualitative content analysis of actionable advice in information security policies – introducing the keyword loss of specificity metric
Elham Rostami, Fredrik KarlssonThis paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…
Bridging knowledge gap: the contribution of employees’ awareness of AI cyber risks comprehensive program to reducing emerging AI digital threats
Amir Schreiber, Ilan SchreiberIn the modern digital realm, while artificial intelligence (AI) technologies pave the way for unprecedented opportunities, they also give rise to intricate cybersecurity issues…
The sleepless sentinel: factors that predict burnout and sleep quality in cybersecurity professionals
Andrew Reeves, Malcolm Pattinson, Marcus ButaviciusThe purpose of this study is to investigate the extent to which a sample of the Australian cybersecurity industry is impacted by burnout.
Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic
Tim Wright, Zainab Ruhwanya, Jacques OphoffThe COVID-19 pandemic necessitated a significant shift in how employees executed their professional responsibilities. Concurrently, the incidence of cybercrime experienced a…
Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty, Steven D'AlessandroThe current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Cybersecurity in modern cars: awareness and readiness of auto workshops
David Hedberg, Martin Lundgren, Marcus NohlbergThis study aims to explore auto mechanics awareness of repairs and maintenance related to the car’s cybersecurity and provide insights into challenges based on current practice.
An assessment of critical success factors in information security implementation in organizations in Ghana
Joshua Nterful, Ibrahim Osman Adam, Muftawu Dzang Alhassan, Abdallah Abdul-Salam, Abubakar Gbambegu UmarThis paper aims to identify the critical success factors in improving information security in Ghanaian firms.
Getting users to click: a content analysis of phishers’ tactics and techniques in mobile instant messaging phishing
Rufai Ahmad, Sotirios Terzis, Karen RenaudThis study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.
Exploring the critical success factors of information security management: a mixed-method approach
Hao Chen, Yuge HaiEffective information security management (ISM) contributes to building a healthy organizational digital ecology. However, few studies have built an analysis framework for…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell