Computer Fraud & Security
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world.
Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.
• Current News - A round up of all the latest IT fraud and security news worldwide giving you advance warning of all the latest threats and countermeasures.
• Security Reports - Leading experts discuss recent headline security events will help you better understand the problems and learn from the mistakes of others.
• In-depth Feature Articles - Providing advice and solutions to key IT security management issues to help you develop, implement and strengthen your corporate IT security policy.
• Regular columns - Tales from the Crypt examines the changing face of international cryptography policy. Web Review takes a look at excellent new Web sites to guide the security professional to useful pages. Shockwave Writer offers a stimulating view on a number of hot topics in IT security.
• Technical aspects - IT security explained in clear English to help you convey the value of IT security to board level.
Areas regularly covered:
• Audit and financial control methodologies
• Data encryption
• Risk management
• Network security
• Contingency planning and disaster recovery
• Access control
• Security software and software protection
• Authentication and validation
• Virus reports
• The internet
• E-commerce security
Editor: Steve Mansfield-Devine
Imprint: Elsevier Advanced Technology
ISSN: 1361-3723
Most cited
Top 10 Cited (articles published in the last five years)
Extracted from Scopus (on Wed May 1)Furnell, S. | Clarke, N. | Karatzouni, S. Beyond the PIN: Enhancing user authentication for mobile devices Computer Fraud and Security, Volume 2008, Issue 8, 2008-08-01, Pages 12-17 Furnell, S. | Thomson, K.-L. From culture to disobedience: Recognising the varying user acceptance of IT security Computer Fraud and Security, Volume 2009, Issue 2, 2009-02-01, Pages 5-10 Furnell, S. | Evangelatos, K. Public awareness and perceptions of biometrics Computer Fraud and Security, Volume 2007, Issue 1, 2007-01-01, Pages 8-13 Kadhiwal, S. | Zulfiquar, Muhammad Analysis of mobile payment security measures and different standards Computer Fraud and Security, Volume 2007, Issue 6, 2007-06-01, Pages 12-16 Ollmann, G. The evolution of commercial malware development kits and colour-by-numbers custom malware Computer Fraud and Security, Volume 2008, Issue 9, 2008-09-01, Pages 4-7 Ray, E. | Schultz, E.E. An early look at Windows Vista security Computer Fraud and Security, Volume 2007, Issue 1, 2007-01-01, Pages 4-7 Schultz, E.E. Computer forensics challenges in responding to incidents in real-life settings Computer Fraud and Security, Volume 2007, Issue 12, 2007-12-01, Pages 12-16 Gorge, M. Lawful interception - key concepts, actors, trends and best practice considerations Computer Fraud and Security, Volume 2007, Issue 9, 2007-09-01, Pages 10-14 Everett, C. Social media: Opportunity or risk? Computer Fraud and Security, Volume 2010, Issue 6, 2010-08-13, Pages 8-10 Furnell, S. End-user security culture: A lesson that will never be learnt? Computer Fraud and Security, Volume 2008, Issue 4, 2008-04-01, Pages 6-9 - View all items
Recent articles
Wed May 11 Cyber-attacks escalate Korean tensions Computer Fraud & Security, Volume 2013, Issue 4, April 2013, Pages 1-3 2 David Emm Security for SMBs: why it's not just big businesses that should be concerned Computer Fraud & Security, Volume 2013, Issue 4, April 2013, Pages 5-8 3 John Yeo Using penetration testing to enhance your company's security Computer Fraud & Security, Volume 2013, Issue 4, April 2013, Pages 17-20 4 Steven Furnell Getting past passwords Computer Fraud & Security, Volume 2013, Issue 4, April 2013, Pages 8-13 5 UK shares information to combat cyber-threats Computer Fraud & Security, Volume 2013, Issue 4, April 2013, Pages 3- 6 Mike Alford Intelligent fraud detection: a comparison of neural and Bayesian methods Computer Fraud & Security, Volume 2013, Issue 4, April 2013, Pages 14-16 7 Study finds major information security skills shortage Computer Fraud & Security, Volume 2013, Issue 3, March 2013, Pages 1-3 8 Bimal Parmar Employee negligence: the most overlooked vulnerability Computer Fraud & Security, Volume 2013, Issue 3, March 2013, Pages 18-20 9 Mark Yelland Fraud in mobile networks Computer Fraud & Security, Volume 2013, Issue 3, March 2013, Pages 5-9 10 Organisations losing money because of trust failures Computer Fraud & Security, Volume 2013, Issue 3, March 2013, Pages 3- - View all items

