default search action
12th HAISA 2018: Dundee, Scotland, UK
- Nathan L. Clarke, Steven Furnell:
Twelfth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018, Dundee, Scotland, UK, August 29-31, 2018, Proceedings. University of Plymouth 2018, ISBN 978-0-244-40254-9 - Kathryn Parsons, Marcus A. Butavicius, Meredith Lillie, Dragana Calic, Agata McCormac, Malcolm R. Pattinson:
Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience? 1-11 - Francois Mouton, Michael Pepper, Thomas Meyer:
A Social Engineering Prevention Training Tool: Methodology and Design for Validating the SEADM. 12-27 - Peter Mayer, Alexandra Kunz, Melanie Volkamer:
Motivating Users to Consider Recommendations on Password Management Strategies. 28-37 - Verena Zimmermann, Nina Gerber, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt, Peter Mayer:
The Quest to Replace Passwords Revisited - Rating Authentication Schemes. 38-48 - Lynne Y. Williams, Diane Rasmussen Pennington:
An Authentic Self: Big Data and Passive Digital Footprints. 49-56 - Estée van der Walt, Jan Harm Petrus Eloff:
Are Attributes on Social Media Platforms Usable for Assisting in the Automatic Detection of Identity Deception?. 57-66 - Malcolm R. Pattinson, Marcus A. Butavicius, Beau Ciccarello, Meredith Lillie, Kathryn Parsons, Dragana Calic, Agata McCormac:
Adapting Cyber-Security Training to Your Employees. 67-79 - Noluxolo Gcaza:
Cybersecurity Awareness and Education: A Necessary Parameter for Smart Communities. 80-90 - Rahul Maharaj, Rossouw von Solms:
Social Networking: A Tool for Effective Cybersecurity Education in Cyber-Driven Financial Transactions. 91-100 - Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
A Systematic Review of Information Security Knowledge-Sharing Research. 101-110 - Ram Herkanaidu, Steven Furnell, Maria Papadaki, Tharabun Khuchinda:
Designing an Anti-Cyberbullying Programme in Thailand. 111-122 - Wiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Ann Futcher:
An Educational Intervention Towards Safe Smartphone Usage. 123-134 - Jayati Dev, Sanchari Das, Linda Jean Camp:
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. 135-146 - Jacqueline Archibald, Karen Renaud:
POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs). 147-157 - Masike Malatji, Annlizé Marnewick, Suné von Solms:
The Impact of Artificial Intelligence on the Human Aspects of Information and Cybersecurity. 158-169 - Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller:
Warn if Secure or How to Deal with Security by Default in Software Development?. 170-190 - Mark Glenn Evans, Ying He, Iryna Yevseyeva, Helge Janicke:
Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error. 191-202 - Joakim Kävrestad, Marcus Nohlberg:
Defining and Modelling the Online Fraud Process. 203-213 - Sophie Y. Williams, Damien Marriott:
Human Factors in a Computable Cybersecurity Risk Model. 214-224 - Dragana Calic, Mary Brushe, Kathryn Parsons, Christopher Brittain:
Self-disclosing on Facebook can be Risky: Examining the Role of Trust and Social Capital. 225-235 - Jasmine Scott, Jacques Ophoff:
Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information Compromise. 236-245 - Alfred Musarurwa, Stephen Flowerday:
The BYOD Information Security Challenge for CIOs. 246-262 - Andrew M'manga, Shamal Faily, Chris Williams, John McAlaney:
Rationalising Decision Making about Risk: A Normative Approach. 263-271 - Christopher Schmitz, André Sekulla, Sebastian Pape, Volkmar Pipek, Kai Rannenberg:
Easing the Burden of Security Self-Assessments. 272-281
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.