Information security management; information security culture; misuse and abuse of computer systems; computer ethics and security; authorization and access control; malicious software in ubiquitous computing; statistical database security; copy protection system; information security culture; security governance and compliance; data warehousing, data mining and security.