Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-5 of 5
Keywords: Case study
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Advance fee fraud scammers’ criminal expertise and deceptive strategies: a qualitative case study
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (4): 478–503.
Published: 05 May 2023
...Alain Tambe Ebot Purpose This study aims to examine how advance fee fraud (AFF) scammers build their criminal expertise over time and why the AFF scamming deception process succeeds. Design/methodology/approach This study is interpretive, based on case study interview data with two scammers...
Journal Articles
Collaborative security risk estimation in agile software development
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2019) 27 (4): 508–535.
Published: 17 June 2019
... 18 02 2019 27 02 2019 © Emerald Publishing Limited 2019 Emerald Publishing Limited Licensed re-use rights only Case study Risk assessments Agile development Protection Poker Secure software engineering Software security Research Council of Norway 247678...
Journal Articles
Information security practice in Saudi Arabia: case study on Saudi organizations
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (5): 568–583.
Published: 12 November 2018
... 2018 06 06 2018 © Emerald Publishing Limited 2018 Emerald Publishing Limited Licensed re-use rights only Information security Case study Information security policy Information security in Saudi Arabia Information security management Information security procedures...
Journal Articles
Decoding audience interpretations of awareness campaign messages
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (2): 177–193.
Published: 13 June 2016
... on the knowledge component of this metric by examining the awareness campaign audience’s interpretative role in processing the campaign content, through the lens of active audience theory (AAT). Design/methodology/approach Using reflective practices, this research examines a single longitudinal case study...
Journal Articles
Snakes and ladders for digital natives: information security education for the youth
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2014) 22 (2): 179–190.
Published: 03 June 2014
..., several case studies are used to evaluate the research artefact. Findings – The authors believe that the presented artefact could effectively convey basic information security concepts to the youth. Research limitations/implications – This study had a number of limitations. First, all...
