


default search action
17th HAISA 2023: Kent, UK
- Steven Furnell
, Nathan L. Clarke
:
Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings. IFIP Advances in Information and Communication Technology 674, Springer 2023, ISBN 978-3-031-38529-2
Education and Training
- Joakim Kävrestad
, David Lindvall, Marcus Nohlberg
:
Combating Digital Exclusion with Cybersecurity Training - An Interview Study with Swedish Seniors. 3-12 - Sebastiaan H. von Solms
, Jaco du Toit
, Elmarie Kritzinger
:
Another Look at Cybersecurity Awareness Programs. 13-23 - Magdalena Glas
, Fabian Böhm
, Falko Schönteich
, Günther Pernul
:
Cyber Range Exercises: Potentials and Open Challenges for Organizations. 24-35 - Muwei Zheng
, Nathan Swearingen
, William Silva
, Matt Bishop
, Xukai Zou
:
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula. 36-52 - Joakim Kävrestad
, Wesam Fallatah
, Steven Furnell
:
Cybersecurity Training Acceptance: A Literature Review. 53-63 - Fayez Alotaibi, Steven Furnell, Ying He:
Cyber Security Awareness and Education Support for Home and Hybrid Workers. 64-75 - Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil:
On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons Learned. 76-90 - Eliana Stavrou
:
Planning for Professional Development in Cybersecurity: A New Curriculum Design. 91-104 - Gregor Langner
, Steven Furnell
, Gerald Quirchmayr, Florian Skopik
:
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education. 105-115 - Lynn Futcher
, Kerry-Lynn Thomson
, Lean Kucherera
, Noluxolo Gcaza
:
Key Elements for Cybersafety Education of Primary School Learners in South Africa. 116-128 - Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo:
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitalsin South Africa. 129-142 - Saud Alotaibi, Steven Furnell, Y. He:
Towards a Framework for the Personalization of Cybersecurity Awareness. 143-153
Management, Policy and Skills
- Elham Rostami, Fredrik Karlsson:
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security Policies. 157-168 - Dinh Uy Tran
, Audun Jøsang
:
Business Language for Information Security. 169-180 - Erik Bergström
, Martin Lundgren
, Karin Bernsmed
, Guillaume Bour
:
"Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk Management. 181-191 - Armand Vorster
, Adéle da Veiga
:
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof. 192-210 - Tebogo Kesetse Lejaka
, Adéle da Veiga
, Marianne Loock
:
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs). 211-224 - Andrew Reeves, Malcolm R. Pattinson, Marcus A. Butavicius:
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals. 225-236 - Michael de Jager
, Lynn Futcher
, Kerry-Lynn Thomson
:
An Investigation into the Cybersecurity Skills Gap in South Africa. 237-248 - Kristian Kannelønning
, Sokratis K. Katsikas
:
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry. 249-258
Evolving Threats and Attacks
- Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's More Than Just Money: The Real-World Harms from Ransomware Attacks. 261-274 - David Hedberg, Martin Lundgren
, Marcus Nohlberg
:
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops. 275-284 - Khutso Lebea
, Wai Sze Leung
:
Decreasing Physical Access Bottlenecks through Context-Driven Authentication. 285-295 - Urvashi Kishnani, Srinidhi Madabhushi, Sanchari Das:
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective. 296-309 - Daniel G. Conway
, Marcus A. Butavicius
, Kun Yu
, Fang Chen
:
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address. 310-323 - Rufai Ahmad
, Sotirios Terzis
, Karen Renaud
:
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing. 324-336 - Alexander Joukov, Nikolai Joukov:
Six-Year Study of Emails Sent to Unverified Addresses. 337-345
Social-Technical Factors
- Fai Ben Salamah
, Marco A. Palomino
, Maria Papadaki
, Matthew J. Craven
, Steven Furnell
:
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. 349-363 - Najla Aldaraani
, Helen Petrie
, Siamak F. Shahandashti
:
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia. 364-376 - Monica T. Whitty
, Christopher Ruddy
, David A. Keatley
:
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks. 377-390 - Lorenzo Neil
, Julie M. Haney
, Kerrianne Buchanan
, Charlotte Healy:
Analyzing Cybersecurity Definitions for Non-experts. 391-404 - Célia Martinie
, Bilal Naqvi
:
On using the Task Models for Validation and Evolution of Usable Security Design Patterns. 405-417 - Tapiwa Gundu
:
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT. 418-431 - Sinazo Brown, Zainab Ruhwanya
, Ayanda Pekane
:
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers. 432-444 - Tim Wright, Zainab Ruhwanya
, Jacques Ophoff
:
The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the Pandemic. 445-458
Research Methods
- Vuyolwethu Sizoli Mdunyelwa
, Lynn Futcher
, Johan Van Niekerk
:
A Review of Constructive Alignment in Information Security Educational Research. 461-469 - Marcus Gerdin, Åke Grönlund, Ella Kolkowska:
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research. 470-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.