Skip Nav Destination
Close Modal
Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-17 of 17
Keywords: Cyber security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
‘Ctrl, alt, report’: the influence of policy, cyber security job relevance, rank and gender on cyber security incident reporting
Available to PurchaseKristiina Ahola, Daniel Sturman, Marcus Butavicius, Agata McCormac, Nadia Scott, Andrew Reeves, Malcolm Pattinson
Journal:
Information and Computer Security
Information and Computer Security 1–16.
Published: 13 November 2025
...Kristiina Ahola; Daniel Sturman; Marcus Butavicius; Agata McCormac; Nadia Scott; Andrew Reeves; Malcolm Pattinson Purpose Cyber security incidents present a growing risk to organisations due to their increasing sophistication and prevalence. It is crucial for employees, often viewed...
Journal Articles
The hidden barriers to cyber security adoption amongst Small and Medium-Sized Enterprises
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025)
Published: 12 August 2025
...Neeshe Khan; Steven Furnell; Maria Bada; Jason R.C. Nurse; Matthew Rand Purpose Small and medium-sized enterprises (SMEs) share many of the same cyber security needs and challenges as larger organisations but often have significantly less knowledge and capability to deal with them. A fundamental...
Journal Articles
Users’ perceptions of managerial measurements for cloud computing’s cybersecurity – importance-performance analysis
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (4): 590–612.
Published: 07 March 2025
... computing Cyber security Importance-performance analysis Users’ perception Managerial measurements Many organizations have moved to use cloud computing or are considering a move to the cloud space. Cloud computing can provide many benefits to the organizations. Companies are moving to the cloud...
Journal Articles
Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (2): 242–266.
Published: 16 August 2024
...Kristiina Ahola; Marcus Butavicius; Agata McCormac; Daniel Sturman Purpose Cyber security incidents pose a major threat to organisations. Reporting cyber security incidents and providing organisations with information about their true nature, type and volume, is crucial to inform risk-based...
Journal Articles
Unraveling the dynamics of password manager adoption: a deeper dive into critical factors
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (1): 117–139.
Published: 16 July 2024
... Cyber security Password manager Technology adoption User experience Security practice The proliferation of cyber threats and attacks is on the rise (Ghiasi et al., 2023), intensifying concerns regarding the security of online accounts, including those associated with online banking...
Journal Articles
Journal:
Information and Computer Security
Information and Computer Security (2024) 32 (5): 656–675.
Published: 24 May 2024
... attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode Phishing Cyber security Optimism bias According to the Cyber Security Breaches Survey (Ell and Gallucci, 2022), 83% of attacks were phishing...
Journal Articles
Human factors in remote work: examining cyber hygiene practices
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (1): 96–116.
Published: 03 April 2024
... Karayel is the corresponding author and can be contacted at: tugceaslan@duzce.edu.tr or ttugce.karayel@gmail.com 13 11 2023 08 01 2024 22 01 2024 © Emerald Publishing Limited 2024 Emerald Publishing Limited Licensed re-use rights only Cyber hygiene Cyber security...
Journal Articles
Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (4): 404–426.
Published: 02 March 2023
...-playing and discussion-focused techniques to develop and evaluate processes and procedures used in preventing, detecting, mitigating, responding and recovering from cyber incidents. Findings The exercise highlighted the value of using scenario-based exercises in cyber security training. It elaborated...
Journal Articles
The impact of GDPR infringement fines on the market value of firms
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2023) 31 (1): 51–64.
Published: 07 September 2022
... the importance of data privacy compliance, thereby informing cyber security investment strategies for organisations. Design/methodology/approach Previous studies have shown (varying degrees of) evidence of a negative impact of data breach announcements on the share price of publicly listed companies...
Journal Articles
Information and cyber security maturity models: a systematic literature review
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (4): 627–644.
Published: 08 June 2020
... review Information security Maturity model SLR Cyber security According to Mettler (2011) , maturity implies “an evolutionary progress in the demonstration of a specific ability or in the accomplishment of a target from an initial to a desired or normally occurring end stage...
Journal Articles
Enhancing cyber security behavior: an internal social marketing approach
Available to PurchaseHiep Cong Pham, Linda Brennan, Lukas Parker, Nhat Tram Phan-Le, Irfan Ulhaq, Mathews Zanda Nkhoma, Minh Nhat Nguyen
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (2): 133–159.
Published: 14 October 2019
... Hiep Pham can be contacted at: hiep.pham@rmit.edu.vn 29 01 2019 22 05 2019 29 07 2019 29 08 2019 05 09 2019 © Emerald Publishing Limited 2019 Emerald Publishing Limited Licensed re-use rights only Behavior change Cyber security 7P marketing mix Human...
Journal Articles
The effect of resilience and job stress on information security awareness
Available to PurchaseAgata McCormac, Dragana Calic, Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Meredith Lillie
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (3): 277–289.
Published: 09 July 2018
..., on resilience, job stress and ISA. © Commonwealth of Australia. 2018 Commonwealth of Australia. Licensed re-use rights only Cyber security Information security Resilience Job stress Information security awareness (ISA) A total of 1,048 (535 female, 512 male and 1 gender unspecified...
Journal Articles
Data security and consumer trust in FinTech innovation in Germany
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2018) 26 (1): 109–128.
Published: 12 March 2018
... service, with the intention of developing a supervisory regime to enhance security (Deutsche Bundesbank Eurosystem, 2015 ; Carlson, 2015). In the face of ongoing cyber-attacks, financial institutions must continue to strengthen their cyber security framework by investing assets in gathering, examining...
Journal Articles
State transgression on electronic expression: is it for real?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (4): 382–401.
Published: 09 October 2017
... whether nation states are using cyber-security as a propaganda tool to transgress on electronic expression. Design/methodology/approach The Website of the UN Office of the High Commissioner for Human Rights states “In December 2013, the United Nations General Assembly adopted resolution 68/167, which...
Journal Articles
A general morphological analysis: delineating a cyber-security culture
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2017) 25 (3): 259–278.
Published: 10 July 2017
...Noluxolo Gcaza; Rossouw von Solms; Marthie M. Grobler; Joey Jansen van Vuuren Purpose The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were...
Journal Articles
Estimates on the effectiveness of web application firewalls against targeted attacks
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (4): 250–265.
Published: 07 October 2013
... four categories of variables of importance towards the effectiveness of countermeasures for WA vulnerabilities: © Emerald Group Publishing Limited 2013 Web applications Cyber security Intrusion detection Web applications (WAs) are widely used and often hold important data...
Journal Articles
Push and pull effects of homeland information security incentives
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (3): 155–176.
Published: 12 July 2013
..., the higher the budget, the higher is the amount allocated to IT in general and to information security in particular. © Emerald Group Publishing Limited 2013 Cyber security Homeland information security Computer security Data security Latent growth model Federal agencies Push and pull...
