default search action
14th HAISA 2020: Mytilene, Lesbos, Greece
- Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings. IFIP Advances in Information and Communication Technology 593, Springer 2020, ISBN 978-3-030-57403-1
Privacy and COVID-19
- Leah Shanley, Michael N. Johnstone, Michael Crowley, Patryk Szewczyk:
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? 3-15 - Adéle da Veiga, Jacques Ophoff:
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa. 16-29 - Georgios Magklaras, Lucia Nikolaia López-Bojórquez:
A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone Applications. 30-44
Awareness and Training
- Ram Herkanaidu, Steven M. Furnell, Maria Papadaki:
Towards a Cross-Cultural Education Framework for Online Safety Awareness. 47-57 - Simon Marsden:
Towards an Heuristic Approach to Cybersecurity and Online Safety Pedagogy. 58-70 - Joakim Kävrestad, Marcus Nohlberg:
ContextBased MicroTraining: A Framework for Information Security Training. 71-81
Social Engineering
- Mohammed Khaled N. Alotaibi:
Employees' Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test. 85-96 - Ntsewa B. Mokobane, Reinhardt A. Botha:
Does Ubuntu Influence Social Engineering Susceptibility? 97-108 - Ploy Unchit, Sanchari Das, Andrew Kim, L. Jean Camp:
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory. 109-120
Security Behaviour
- Esra Alkhamis, Helen Petrie, Karen Renaud:
KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children. 123-132 - Dirk P. Snyman, Hennie A. Kruger:
Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework. 133-143 - Yotamu Gangire, Adéle da Veiga, Marlien Herselman:
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory. 144-157
Education
- Bilge Yigit Ozkan, Marco Spruit:
Addressing SME Characteristics for Designing Information Security Maturity Models. 161-174 - Ismini Vasileiou:
Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships. 175-185 - Dean John von Schoultz, Kerry-Lynn Thomson, Johan Van Niekerk:
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction. 186-207
End-User Security
- Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, L. Jean Camp:
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. 211-223 - Marcus Nohlberg, Joakim Kävrestad:
Exploring Information Security and Domestic Equality. 224-232 - Jan Freudenreich, Jake Weidman, Jens Grossklags:
Responding to KRACK: Wi-Fi Security Awareness in Private Households. 233-243
Usable Security
- Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg:
Exploring the Meaning of "Usable Security". 247-258 - Karen Renaud, Graham Johnson, Jacques Ophoff:
Dyslexia and Password Usage: Accessibility in Authentication Design. 259-268 - Panagiotis Zagouras, Christos Kalloniatis:
Securing User eXperience: A Review for the End-Users' Software Robustness. 269-285
Security Policy
- Alireza Shojaifar, Samuel A. Fricker:
SMEs' Confidentiality Concerns for Security Information Sharing. 289-299 - Kudakwashe Maguraushe, Adéle da Veiga, Nico Martins:
Validation of an Information Privacy Perception Instrument at a Zimbabwean University. 300-314 - Maria Sideri, Stefanos Gritzalis:
Are We Really Informed on the Rights GDPR Guarantees? 315-326
Attitudes and Perceptions
- Mahdi Nasrullah Al-Ameen, Apoorva Chauhan, M. A. Manazir Ahsan, Huzeyfe Kocabas:
"Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT Devices. 329-340 - Joseph Williams, Paul Stephens:
Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law Enforcement. 341-352 - Zainab Ruhwanya, Jacques Ophoff:
Critical Analysis of Information Security Culture Definitions. 353-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.