default search action
15th HAISA 2021: Virtual Event
- Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings. IFIP Advances in Information and Communication Technology 613, Springer 2021, ISBN 978-3-030-81110-5
Attitudes and Perspectives
- Dhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver:
Cyber Security in Healthcare Organisations. 3-11 - Jesper Holgersson, Joakim Kävrestad, Marcus Nohlberg:
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? 12-21 - Aous Al Salek, Joakim Kävrestad, Marcus Nohlberg:
Exploring Experiences of Using SETA in Nordic Municipalities. 22-31
Cyber Security Education
- Alice Jaffray, Conor Finn, Jason R. C. Nurse:
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education. 35-45 - Adéle da Veiga, Elisha O. Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Pheeha Machaka:
A Reference Point for Designing a Cybersecurity Curriculum for Universities. 46-62 - Charles Mawutor Ocloo, Adéle da Veiga, Jan H. Kroeze:
A Conceptual Information Security Culture Framework for Higher Learning Institutions. 63-80 - Martin Sparrius, Moufida Sadok, Peter M. Bednar:
What Can We Learn from the Analysis of Information Security Policies? The Case of UK's Schools. 81-90 - Dirk P. Snyman, Günther R. Drevin, Hennie A. Kruger, Lynette Drevin, Johann Allers:
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children. 91-101 - Joakim Kävrestad, Marcus Nohlberg:
Evaluation Strategies for Cybersecurity Training Methods: A Literature Review. 102-112
People and Technology
- Sarah Turner, Jason R. C. Nurse, Shujun Li:
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. 115-126 - Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Making Access Control Easy in IoT. 127-137 - Daniel Hulatt, Eliana Stavrou:
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation. 138-147 - Max Clasen, Fudong Li, David M. Williams:
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing. 148-163 - Eugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher:
Towards a Risk Assessment Matrix for Information Security Workarounds. 164-178 - Keshnee Padayachee:
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon. 179-188 - John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das:
A Literature Review on Virtual Reality Authentication. 189-198 - Lee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray:
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints. 199-210 - Paul Brockbanks, Martin J. Butler:
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords. 211-222
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.