


default search action
15th HAISA 2021: Virtual Event
- Steven Furnell
, Nathan L. Clarke
:
Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings. IFIP Advances in Information and Communication Technology 613, Springer 2021, ISBN 978-3-030-81110-5
Attitudes and Perspectives
- Dhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver:
Cyber Security in Healthcare Organisations. 3-11 - Jesper Holgersson
, Joakim Kävrestad
, Marcus Nohlberg
:
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? 12-21 - Aous Al Salek
, Joakim Kävrestad
, Marcus Nohlberg
:
Exploring Experiences of Using SETA in Nordic Municipalities. 22-31
Cyber Security Education
- Alice Jaffray, Conor Finn, Jason R. C. Nurse:
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education. 35-45 - Adéle da Veiga
, Elisha O. Ochola
, Mathias Mujinga
, Keshnee Padayachee
, Emilia Mwim
, Elmarie Kritzinger
, Marianne Loock
, Pheeha Machaka
:
A Reference Point for Designing a Cybersecurity Curriculum for Universities. 46-62 - Charles Mawutor Ocloo
, Adéle da Veiga
, Jan H. Kroeze
:
A Conceptual Information Security Culture Framework for Higher Learning Institutions. 63-80 - Martin Sparrius
, Moufida Sadok
, Peter M. Bednar
:
What Can We Learn from the Analysis of Information Security Policies? The Case of UK's Schools. 81-90 - Dirk P. Snyman
, Günther R. Drevin
, Hennie A. Kruger
, Lynette Drevin
, Johann Allers
:
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children. 91-101 - Joakim Kävrestad
, Marcus Nohlberg
:
Evaluation Strategies for Cybersecurity Training Methods: A Literature Review. 102-112
People and Technology
- Sarah Turner
, Jason R. C. Nurse, Shujun Li:
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices. 115-126 - Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Making Access Control Easy in IoT. 127-137 - Daniel Hulatt
, Eliana Stavrou
:
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation. 138-147 - Max Clasen, Fudong Li, David M. Williams
:
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing. 148-163 - Eugene Slabbert
, Kerry-Lynn Thomson
, Lynn Futcher
:
Towards a Risk Assessment Matrix for Information Security Workarounds. 164-178 - Keshnee Padayachee
:
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon. 179-188 - John M. Jones, Reyhan Duezguen, Peter Mayer
, Melanie Volkamer, Sanchari Das:
A Literature Review on Virtual Reality Authentication. 189-198 - Lee Livsey
, Helen Petrie
, Siamak F. Shahandashti
, Aidan Fray:
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints. 199-210 - Paul Brockbanks, Martin J. Butler
:
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords. 211-222

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.