Table of contents
Matching training to individual learning styles improves information security awareness
Malcolm Pattinson, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, Agata McCormacThis paper aims to introduce the concept of a framework of cyber-security controls that are adaptable to different types of organisations and different types of employees. One of…
Mobile agent-based SIEM for event collection and normalization externalization
Nabil Moukafih, Ghizlane Orhanou, Said ElhajjiThis paper aims to propose a mobile agent-based security information and event management architecture (MA-SIEM) that uses mobile agents for near real-time event collection and…
Evaluating privacy impact assessment methods: guidelines and best practice
Konstantina Vemou, Maria KarydaThis paper aims to practically guide privacy impact assessment (PIA) implementation by proposing a PIA process incorporating best practices from existing PIA guidelines and…
The cyber-insurance market in Norway
Hayretdin Bahşi, Ulrik Franke, Even Langfeldt FribergThis paper aims to describe the cyber-insurance market in Norway but offers conclusions that are interesting to a wider audience.
Requirements for private communications over public spheres
Konstantina Vemou, Maria KarydaIn the Web 2.0 era, users massively communicate through social networking services (SNS), often under false expectations that their communications and personal data are private…
Patient use of online medical records: an application of technology acceptance framework
Surma Mukhopadhyay, Ramsankar Basak, Darrell Carpenter, Brian J. ReithelLittle is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy…
AppAware: a policy visualization model for mobile applications
Ioannis Paspatis, Aggeliki Tsohou, Spyros KokolakisPrivacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this…
ISSN:
2056-4961Renamed from:
Information Management & Computer SecurityOnline date, start – end:
2015Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Prof Steven Furnell