default search action
17th HAISA 2023: Kent, UK
- Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings. IFIP Advances in Information and Communication Technology 674, Springer 2023, ISBN 978-3-031-38529-2
Education and Training
- Joakim Kävrestad, David Lindvall, Marcus Nohlberg:
Combating Digital Exclusion with Cybersecurity Training - An Interview Study with Swedish Seniors. 3-12 - Sebastiaan H. von Solms, Jaco du Toit, Elmarie Kritzinger:
Another Look at Cybersecurity Awareness Programs. 13-23 - Magdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul:
Cyber Range Exercises: Potentials and Open Challenges for Organizations. 24-35 - Muwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou:
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula. 36-52 - Joakim Kävrestad, Wesam Fallatah, Steven Furnell:
Cybersecurity Training Acceptance: A Literature Review. 53-63 - Fayez Alotaibi, Steven Furnell, Ying He:
Cyber Security Awareness and Education Support for Home and Hybrid Workers. 64-75 - Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil:
On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons Learned. 76-90 - Eliana Stavrou:
Planning for Professional Development in Cybersecurity: A New Curriculum Design. 91-104 - Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik:
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education. 105-115 - Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza:
Key Elements for Cybersafety Education of Primary School Learners in South Africa. 116-128 - Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo:
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitalsin South Africa. 129-142 - Saud Alotaibi, Steven Furnell, Y. He:
Towards a Framework for the Personalization of Cybersecurity Awareness. 143-153
Management, Policy and Skills
- Elham Rostami, Fredrik Karlsson:
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security Policies. 157-168 - Dinh Uy Tran, Audun Jøsang:
Business Language for Information Security. 169-180 - Erik Bergström, Martin Lundgren, Karin Bernsmed, Guillaume Bour:
"Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk Management. 181-191 - Armand Vorster, Adéle da Veiga:
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof. 192-210 - Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock:
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs). 211-224 - Andrew Reeves, Malcolm R. Pattinson, Marcus A. Butavicius:
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals. 225-236 - Michael de Jager, Lynn Futcher, Kerry-Lynn Thomson:
An Investigation into the Cybersecurity Skills Gap in South Africa. 237-248 - Kristian Kannelønning, Sokratis K. Katsikas:
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry. 249-258
Evolving Threats and Attacks
- Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's More Than Just Money: The Real-World Harms from Ransomware Attacks. 261-274 - David Hedberg, Martin Lundgren, Marcus Nohlberg:
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops. 275-284 - Khutso Lebea, Wai Sze Leung:
Decreasing Physical Access Bottlenecks through Context-Driven Authentication. 285-295 - Urvashi Kishnani, Srinidhi Madabhushi, Sanchari Das:
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective. 296-309 - Daniel G. Conway, Marcus A. Butavicius, Kun Yu, Fang Chen:
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address. 310-323 - Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing. 324-336 - Alexander Joukov, Nikolai Joukov:
Six-Year Study of Emails Sent to Unverified Addresses. 337-345
Social-Technical Factors
- Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell:
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. 349-363 - Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti:
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia. 364-376 - Monica T. Whitty, Christopher Ruddy, David A. Keatley:
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks. 377-390 - Lorenzo Neil, Julie M. Haney, Kerrianne Buchanan, Charlotte Healy:
Analyzing Cybersecurity Definitions for Non-experts. 391-404 - Célia Martinie, Bilal Naqvi:
On using the Task Models for Validation and Evolution of Usable Security Design Patterns. 405-417 - Tapiwa Gundu:
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT. 418-431 - Sinazo Brown, Zainab Ruhwanya, Ayanda Pekane:
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers. 432-444 - Tim Wright, Zainab Ruhwanya, Jacques Ophoff:
The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the Pandemic. 445-458
Research Methods
- Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
A Review of Constructive Alignment in Information Security Educational Research. 461-469 - Marcus Gerdin, Åke Grönlund, Ella Kolkowska:
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research. 470-481
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.