Computer Fraud & Security
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world.
Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.
• Current News - A round up of all the latest IT fraud and security news worldwide giving you advance warning of all the latest threats and countermeasures.
• Security Reports - Leading experts discuss recent headline security events will help you better understand the problems and learn from the mistakes of others.
• In-depth Feature Articles - Providing advice and solutions to key IT security management issues to help you develop, implement and strengthen your corporate IT security policy.
• Regular columns - Tales from the Crypt examines the changing face of international cryptography policy. Web Review takes a look at excellent new Web sites to guide the security professional to useful pages. Shockwave Writer offers a stimulating view on a number of hot topics in IT security.
• Technical aspects - IT security explained in clear English to help you convey the value of IT security to board level.
Areas regularly covered:
• Audit and financial control methodologies
• Data encryption
• Risk management
• Network security
• Contingency planning and disaster recovery
• Access control
• Security software and software protection
• Authentication and validation
• Virus reports
• The internet
• E-commerce security
Editor: Steve Mansfield-Devine
Imprint: Elsevier Advanced Technology
ISSN: 1361-3723
Most cited
Top 10 Cited (articles published in the last five years)
Extracted from Scopus (on Sat Jun 29)Furnell, S. | Clarke, N. | Karatzouni, S. Beyond the PIN: Enhancing user authentication for mobile devices Computer Fraud and Security, Volume 2008, Issue 8, 2008-08-01, Pages 12-17 Furnell, S. | Thomson, K.-L. From culture to disobedience: Recognising the varying user acceptance of IT security Computer Fraud and Security, Volume 2009, Issue 2, 2009-02-01, Pages 5-10 Furnell, S. | Evangelatos, K. Public awareness and perceptions of biometrics Computer Fraud and Security, Volume 2007, Issue 1, 2007-01-01, Pages 8-13 Kadhiwal, S. | Zulfiquar, Muhammad Analysis of mobile payment security measures and different standards Computer Fraud and Security, Volume 2007, Issue 6, 2007-06-01, Pages 12-16 Ollmann, G. The evolution of commercial malware development kits and colour-by-numbers custom malware Computer Fraud and Security, Volume 2008, Issue 9, 2008-09-01, Pages 4-7 Ray, E. | Schultz, E.E. An early look at Windows Vista security Computer Fraud and Security, Volume 2007, Issue 1, 2007-01-01, Pages 4-7 Everett, C. Social media: Opportunity or risk? Computer Fraud and Security, Volume 2010, Issue 6, 2010-08-13, Pages 8-10 Schultz, E.E. Computer forensics challenges in responding to incidents in real-life settings Computer Fraud and Security, Volume 2007, Issue 12, 2007-12-01, Pages 12-16 Gorge, M. Lawful interception - key concepts, actors, trends and best practice considerations Computer Fraud and Security, Volume 2007, Issue 9, 2007-09-01, Pages 10-14 Hawthorn, N. Finding security in the cloud Computer Fraud and Security, Volume 2009, Issue 10, 2009-10-01, Pages 19-20 - View all items
Most downloaded
Most Read Articles - counted by Article downloads on SciVerse ScienceDirect in the period 01 April 2002 to 31 May 2013
Sat Jun 291 Catherine Everett Social media: opportunity or risk? Computer Fraud & Security, Volume 2010, Issue 6, June 2010, Pages 8-10 2 Catherine Everett Cloud computing 𢀓 A question of trust Computer Fraud & Security, Volume 2009, Issue 6, June 2009, Pages 5-7 3 Steven Furnell E-commerce security: a question of trust Computer Fraud & Security, Volume 2004, Issue 10, October 2004, Pages 10-14 4 Jim Mortleman Social media strategies Computer Fraud & Security, Volume 2011, Issue 5, May 2011, Pages 8-11 5 Peter Sommer The future for the policing of cybercrime Computer Fraud & Security, Volume 2004, Issue 1, January 2004, Pages 8-12 6 J.H.P. Eloff | M.M. Eloff Information security architecture Computer Fraud & Security, Volume 2005, Issue 11, November 2005, Pages 10-16 7 Chris Hutchings Commercial use of Facebook and Twitter 𢀓 risks and rewards Computer Fraud & Security, Volume 2012, Issue 6, June 2012, Pages 19-20 8 Anna Granova | JHP Eloff Online banking and identity theft: who carries the risk? Computer Fraud & Security, Volume 2004, Issue 11, November 2004, Pages 7-11 9 Steven Hinde Identity theft & fraud Computer Fraud & Security, Volume 2005, Issue 6, June 2005, Pages 18-20 10 Andrew Jones Cyber terrorism: fact or fiction Computer Fraud & Security, Volume 2005, Issue 6, June 2005, Pages 4-7 - View all items
Recent articles
Sat Jun 291 Danny Bradbury Information warfare: a battle waged in public Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 15-18 2 Tim Ring A breach too far? Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 5-9 3 Smaller businesses most at risk Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 3- 4 Derek Manky Cybercrime as a service: a very modern business Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 9-13 5 More accusations of hacking by China Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 1-3 6 Florian Malecki Defending your business from exploit kits Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 19-20 7 Chris Jenkins The three pillars of a secure hybrid cloud environment Computer Fraud & Security, Volume 2013, Issue 6, June 2013, Pages 13-15 8 Sara Moshtari | Ashkan Sami | Mahdi Azimi Using complexity metrics to improve software security Computer Fraud & Security, Volume 2013, Issue 5, May 2013, Pages 8-17 9 Data Breach Investigations Report: the rise of state-sponsored attacks Computer Fraud & Security, Volume 2013, Issue 5, May 2013, Pages 1-3 10 Joseph Souren Security by design: hardware-based security in Windows 8 Computer Fraud & Security, Volume 2013, Issue 5, May 2013, Pages 18-20 - View all items

