


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2017
- Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. HAISA 2017: 126-144 - Debi Ashenden:
What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research. HAISA 2017: 251-260 - Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie:
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture. HAISA 2017: 12-23 - Chris Culnane, Vanessa Teague:
Why Open Government is good for cybersecurity and public trust - now would be a good time to start. HAISA 2017: 236-250 - Val A. Hooper, Jacques Ophoff:
The Influence of Organizational Commitment on Information Security Policy Compliance. HAISA 2017: 114-125 - Michael James, Patryk Szewczyk:
Jurisdictional Issues in Cloud Forensics. HAISA 2017: 225-235 - Jurjen Jansen, Paul van Schaik:
Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing. HAISA 2017: 1-11 - Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie:
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness. HAISA 2017: 80-90 - Vuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher:
Secure Coding Practices in the Software Development Capstone Projects. HAISA 2017: 282-291 - Johan van de Merwe, Francois Mouton:
Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle. HAISA 2017: 24-40 - Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:
Involving Users in the Design of a Serious Game for Security Questions Education. HAISA 2017: 177-187 - Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky:
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. HAISA 2017: 41-51 - Henry Oladimeji, Jacques Ophoff:
Factors Influencing the Use of Privacy Settings in Location-Based Social Networks. HAISA 2017: 215-224 - Joseph Omidosu, Jacques Ophoff:
Employee Information Security Beliefs in the Home Environment. HAISA 2017: 167-176 - Ali Mohammad Padyab, Anna Ståhlbröst:
Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation. HAISA 2017: 202-214 - Asanka I Pathirana, Patricia A. H. Williams:
The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs). HAISA 2017: 292-302 - Andrew Reeves, Kathryn Parsons, Dragana Calic:
Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness. HAISA 2017: 145-155 - Abdulhadi Shoufan, Ernesto Damiani:
How Reliable are Experts’ Assessments? A Case Study on UAV Security. HAISA 2017: 104-113 - Dirk Snyman, Hennie A. Kruger, Wayne D. Kearney:
The Lemming Effect in Information Security. HAISA 2017: 91-103 - Suné von Solms:
Digital Wellness: Concepts of cybersecurity presented visually for children. HAISA 2017: 156-166 - Suné von Solms, Lynn Futcher:
Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies. HAISA 2017: 261-271 - Patryk Szewczyk, Dan Blackman, Krishnun Sansurooah:
An Analysis of Unauthorized Wireless Network Usage in Western Australia. HAISA 2017: 272-281 - Alaa Tolah, Steven Furnell, Maria Papadaki:
A comperhansive framework for cultivating and assessing Information Security Culture . HAISA 2017: 52-64 - Adéle da Veiga:
The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions. HAISA 2017: 65-79 - Adéle da Veiga:
An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study. HAISA 2017: 188-201 - Steven Furnell, Nathan L. Clarke:
Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. University of Plymouth 2017, ISBN 978-1-84102-428-8 [contents]
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-03-26 04:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint