Skip to Main Content
Skip Nav Destination
Keywords: Cyber security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Information and Computer Security (2025)
Published: 12 August 2025
...Neeshe Khan; Steven Furnell; Maria Bada; Jason R.C. Nurse; Matthew Rand Purpose Small and medium-sized enterprises (SMEs) share many of the same cyber security needs and challenges as larger organisations but often have significantly less knowledge and capability to deal with them. A fundamental...
Journal Articles
Journal Articles
Journal Articles
Information and Computer Security (2025) 33 (1): 117–139.
Published: 16 July 2024
... Cyber security Password manager Technology adoption User experience Security practice The proliferation of cyber threats and attacks is on the rise (Ghiasi et al., 2023), intensifying concerns regarding the security of online accounts, including those associated with online banking...
Journal Articles
Information and Computer Security (2024) 32 (5): 656–675.
Published: 24 May 2024
... attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode Phishing Cyber security Optimism bias According to the Cyber Security Breaches Survey (Ell and Gallucci, 2022), 83% of attacks were phishing...
Journal Articles
Information and Computer Security (2025) 33 (1): 96–116.
Published: 03 April 2024
... Karayel is the corresponding author and can be contacted at: tugceaslan@duzce.edu.tr or ttugce.karayel@gmail.com 13 11 2023 08 01 2024 22 01 2024 © Emerald Publishing Limited 2024 Emerald Publishing Limited Licensed re-use rights only Cyber hygiene Cyber security...
Journal Articles
Journal Articles
Information and Computer Security (2023) 31 (1): 51–64.
Published: 07 September 2022
... the importance of data privacy compliance, thereby informing cyber security investment strategies for organisations. Design/methodology/approach Previous studies have shown (varying degrees of) evidence of a negative impact of data breach announcements on the share price of publicly listed companies...
Journal Articles
Information and Computer Security (2020) 28 (4): 627–644.
Published: 08 June 2020
... review Information security Maturity model SLR Cyber security According to Mettler (2011) , maturity implies “an evolutionary progress in the demonstration of a specific ability or in the accomplishment of a target from an initial to a desired or normally occurring end stage...
Journal Articles
Information and Computer Security (2020) 28 (2): 133–159.
Published: 14 October 2019
... Hiep Pham can be contacted at: hiep.pham@rmit.edu.vn 29 01 2019 22 05 2019 29 07 2019 29 08 2019 05 09 2019 © Emerald Publishing Limited 2019 Emerald Publishing Limited Licensed re-use rights only Behavior change Cyber security 7P marketing mix Human...
Journal Articles
Information and Computer Security (2018) 26 (3): 277–289.
Published: 09 July 2018
..., on resilience, job stress and ISA. © Commonwealth of Australia. 2018 Commonwealth of Australia. Licensed re-use rights only Cyber security Information security Resilience Job stress Information security awareness (ISA) A total of 1,048 (535 female, 512 male and 1 gender unspecified...
Journal Articles
Information and Computer Security (2018) 26 (1): 109–128.
Published: 12 March 2018
... service, with the intention of developing a supervisory regime to enhance security (Deutsche Bundesbank Eurosystem, 2015 ; Carlson, 2015). In the face of ongoing cyber-attacks, financial institutions must continue to strengthen their cyber security framework by investing assets in gathering, examining...
Journal Articles
Information and Computer Security (2017) 25 (4): 382–401.
Published: 09 October 2017
... whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression. Design/methodology/approach The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which...
Journal Articles
Information and Computer Security (2017) 25 (3): 259–278.
Published: 10 July 2017
...Noluxolo Gcaza; Rossouw von Solms; Marthie M. Grobler; Joey Jansen van Vuuren Purpose The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were...
Journal Articles
Information Management & Computer Security (2013) 21 (4): 250–265.
Published: 07 October 2013
... four categories of variables of importance towards the effectiveness of countermeasures for WA vulnerabilities: © Emerald Group Publishing Limited 2013 Web applications Cyber security Intrusion detection Web applications (WAs) are widely used and often hold important data...
Journal Articles
Information Management & Computer Security (2013) 21 (3): 155–176.
Published: 12 July 2013
..., the higher the budget, the higher is the amount allocated to IT in general and to information security in particular. © Emerald Group Publishing Limited 2013 Cyber security Homeland information security Computer security Data security Latent growth model Federal agencies Push and pull...

or Create an Account

Close Modal
Close Modal