default search action
18th HAISA 2024: Skövde, Sweden
- Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9-11, 2024, Proceedings, Part I. IFIP Advances in Information and Communication Technology 721, Springer 2025, ISBN 978-3-031-72558-6
Management and Risk
- Tobias Reittinger, Magdalena Glas, Sarah Aminzada, Günther Pernul:
Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality. 3-16 - Noluhle Makhubalo, Dirk Snyman:
Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector. 17-31 - Samantha Phillips, Malte Hansen, Amukelani Matsilele:
Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists. 32-46 - Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti:
A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats. 47-60 - James Clark, Zainab Ruhwanya:
Investigating the Factors Influencing Individuals' Self-sovereign Identity Adoption Intentions. 61-78 - Christine Große:
"There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the Digital Age. 79-92 - Raymond Agyemang, Steven Furnell, Tim Muller:
A Profile-Based Cyber Security Readiness Assessment Framework at Country Level. 93-106 - Erik Bergström, Simon Andersson, Martin Lundgren:
To Risk Analyse, or Not to Risk Analyse: That's the Question. 107-119 - Emelie Mannebäck, Rose-Mharie Åhlfeldt:
Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review. 120-133 - Salim Awudu, Sotirios Terzis:
Information Security Management in Digitized Identity Systems - The Case of the Ghanaian National Identification Authority (NIA). 134-147 - Neeshe Khan, Steven Furnell, Maria Bada, Jason R. C. Nurse, Matthew Rand:
Assessing Cyber Security Support for Small and Medium-Sized Enterprises. 148-162
Social Engineering
- Nathan Monsoro, Célia Martinie, Philippe A. Palanque, Théo Saubanère:
A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks. 165-179 - Carlo Kopp:
Defining Measures of Effect for Disinformation Attacks. 180-199 - Stella Kazamia, Chris Culnane, Daniel Gardham, Suzanne Prior, Helen Treharne:
Phish and Tips: - Phishing Awareness and Education for Older Adults. 200-214 - Mattia Mossano, Melanie Volkamer:
Literature Review: Misconceptions About Phishing. 215-228
Technical Attacks and Defenses
- Louis Hassett, Daniel Ogwok:
Linux Kernel Keyloggers and Information Security. 231-242 - J. Scott-King, Zainab Ruhwanya:
The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry. 243-263 - Tristen K. Amador, Roberta A. Mancuso, Steven Fulton, Erik Moore, Daniel M. Likarish:
An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack. 264-277 - Ebenhaeser Otto Janse van Rensburg, Reinhardt A. Botha, Bertram Haskins:
Research Agenda for Speaker Authentication. 278-291
Usable Security
- Nourah Alshomrani, Steven Furnell, Helena Webb:
A Unified Privacy and Permission Management Framework. 295-307 - Helen Petrie, Gayathri Sreekumar, Siamak F. Shahandashti:
Understanding Users' Mental Models of Federated Identity Management (FIM): Use of a New Tangible Elicitation Method. 308-322 - Joakim Kävrestad, Richard Fernow, David Lööf, Marcus Birath:
Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden. 323-338 - Patrick Shirazi, Ali Padyab:
Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations. 339-354 - Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, Naomi Woods, Darren Chadwick, Chris Fullwood, Xavier Carpent, Nicholas Gervassis:
Assessing the Cybersecurity Needs and Experiences of Disabled Users. 355-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.