default search action
11. HAISA 2017: Adelaide, Australia
- Steven Furnell, Nathan L. Clarke:
Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. University of Plymouth 2017, ISBN 978-1-84102-428-8 - Jurjen Jansen, Paul van Schaik:
Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing. 1-11 - Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie:
Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture. 12-23 - Johan van de Merwe, Francois Mouton:
Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle. 24-40 - Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky:
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. 41-51 - Alaa Tolah, Steven Furnell, Maria Papadaki:
A comperhansive framework for cultivating and assessing Information Security Culture . 52-64 - Adéle da Veiga:
The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions. 65-79 - Agata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie:
Understanding the Relationships between Resilience, Work Stress and Information Security Awareness. 80-90 - Dirk Snyman, Hennie A. Kruger, Wayne D. Kearney:
The Lemming Effect in Information Security. 91-103 - Abdulhadi Shoufan, Ernesto Damiani:
How Reliable are Experts’ Assessments? A Case Study on UAV Security. 104-113 - Val A. Hooper, Jacques Ophoff:
The Influence of Organizational Commitment on Information Security Policy Compliance. 114-125 - Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. 126-144 - Andrew Reeves, Kathryn Parsons, Dragana Calic:
Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness. 145-155 - Suné von Solms:
Digital Wellness: Concepts of cybersecurity presented visually for children. 156-166 - Joseph Omidosu, Jacques Ophoff:
Employee Information Security Beliefs in the Home Environment. 167-176 - Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:
Involving Users in the Design of a Serious Game for Security Questions Education. 177-187 - Adéle da Veiga:
An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study. 188-201 - Ali Mohammad Padyab, Anna Ståhlbröst:
Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation. 202-214 - Henry Oladimeji, Jacques Ophoff:
Factors Influencing the Use of Privacy Settings in Location-Based Social Networks. 215-224 - Michael James, Patryk Szewczyk:
Jurisdictional Issues in Cloud Forensics. 225-235 - Chris Culnane, Vanessa Teague:
Why Open Government is good for cybersecurity and public trust - now would be a good time to start. 236-250 - Debi Ashenden:
What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research. 251-260 - Suné von Solms, Lynn Futcher:
Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies. 261-271 - Patryk Szewczyk, Dan Blackman, Krishnun Sansurooah:
An Analysis of Unauthorized Wireless Network Usage in Western Australia. 272-281 - Vuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher:
Secure Coding Practices in the Software Development Capstone Projects. 282-291 - Asanka I Pathirana, Patricia A. H. Williams:
The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs). 292-302
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.