Table of contents
An information classification model for public sector organizations in Sweden: a case study of a Swedish municipality
Jan-Halvard Bergquist, Samantha Tinet, Shang GaoThe purpose of this study is to create an information classification model that is tailored to suit the specific needs of public sector organizations in Sweden.
Reducing tax identity theft by identifying vulnerability points in the electronic tax filing process
Benjamin K. Ngugi, Kuo-Ting Hung, Yuanxiang John LiTax Identity Theft involves the illegal use of a potential taxpayer’s identity, usually the social security number, to fraudulently file a tax return and claim a refund. The…
From rationale to lessons learned in the cloud information security risk assessment: a study of organizations in Sweden
Ana Faizi, Ali Padyab, Andreas NaessThis study aims to address the issue of practicing information security risk assessment (ISRA) on cloud solutions by studying municipalities and large organizations in Sweden.
The hindrance of cloud computing acceptance within the financial sectors in Germany
Harrison StewartThe purpose of this study is to develop a model called “IaaS adoption” to identify the various challenges and precise implications that hinder the adoption of infrastructure as a…
Cybersecurity educational games: a theoretical framework
Mark I. Hwang, Susan HelserComputer games that teach cybersecurity concepts have been developed to help both individuals and organizations shore up their defence against cybercrimes. Evidence of the…
BioGames: a new paradigm and a behavioral biometrics collection tool for research purposes
Ioannis Stylios, Spyros Kokolakis, Andreas Skalkos, Sotirios ChatzisThe purpose of this paper is to present a new paradigm, named BioGames, for the extraction of behavioral biometrics (BB) conveniently and entertainingly. To apply the BioGames…
Cybersecurity capabilities for critical infrastructure resilience
Masike Malatji, Annlizé L. Marnewick, Suné Von SolmsFor many innovative organisations, Industry 4.0 paves the way for significant operational efficiencies, quality of goods and services and cost reductions. One of the ways to…
Usability of the login authentication process: passphrases and passwords
Bhaveer Bhana, Stephen Vincent FlowerdayThe average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell