Table of contents
An efficient intrusion detection and prevention framework for ad hoc networks
Abdelaziz Amara Korba, Mehdi Nafaa, Salim GhanemiWireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…
Stress-based security compliance model – an exploratory study
Hiep-Cong Pham, Jamal El-Den, Joan RichardsonThis paper aims to extend current information security compliance research by adapting “work-stress model” of the extended Job Demands-Resources model to explore how security…
Online privacy and security concerns of consumers
Anil Gurung, M.K. RajaPrivacy and security concerns of consumers have been touted as one of the hindrances to the growth of e-commerce. These concerns increase the risk perception of consumers…
Spot the phish by checking the pruned URL
Melanie Volkamer, Karen Renaud, Paul GerberPhishing is still a very popular and effective security threat, and it takes, on average, more than a day to detect new phish websites. Protection by purely technical means is…
Leveraging autobiographical memory for two-factor online authentication
Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque, Matthew WrightTwo-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords…
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Karen Renaud, Stephen Flowerday, Rosanne English, Melanie VolkamerThe purpose of this study was to identify to identify reasons for the lack of protest against dragnet surveillance in the UK. As part of this investigation, a study was carried…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell