Table of contents - Special Issue: Information Security & Privacy
Guest Editors: Karen Renaud
The effects of voluntary GDPR adoption and the readability of privacy statements on customers’ information disclosure intention and trust
Yibo Zhang, Tawei Wang, Carol HsuThe purpose of this paper is to examine the impacts of companies’ voluntary adoption of the General Data Protection Regulation (GDPR) as well as the readability of privacy…
Too little too late: can we control browser fingerprinting?
Nasser Mohammed Al-Fannah, Chris MitchellBrowser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major…
Protecting intellectual property from insider threats: A management information security intelligence perspective
Hyungjin Lukas Kim, Anat Hovav, Jinyoung HanThe purpose of this paper is to propose a theory of information security intelligence and examine the effects of managers’ information security intelligence (MISI) on employees’…
Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training
Wu He, Ivan Ash, Mohd Anwar, Ling Li, Xiaohong Yuan, Li Xu, Xin TianAn organization’s ability to successfully manage intellectual capital is determined by the actions of its employees to prevent or minimize information security incidents. To…
Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory
Anthony Duke Giwah, Ling Wang, Yair Levy, Inkyoung HurThe purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user…
Modelling adaptive information security for SMEs in a cluster
Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck, Verónica Burriel CollThis paper presents a method for adapting an Information Security Focus Area Maturity (ISFAM) model to the organizational characteristics (OCs) of a small- and medium-sized…
PRECEPT: a framework for ethical digital forensics investigations
R.I. Ferguson, Karen Renaud, Sara Wilford, Alastair IronsCyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics…
Out to explore the cybersecurity planet
Giampaolo BellaSecurity ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of…
ISSN:
1469-1930Online date, start – end:
2000Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Professor Merrill Warkentin