default search action
6. HAISA 2012: Crete, Greece
- Nathan L. Clarke, Steven Furnell:
6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings. University of Plymouth 2012, ISBN 978-1-84102-317-5 - Ronald Dodge, Costis Toregas, Lance J. Hoffman:
Cybersecurity Workforce Development Directions. 1-12 - Omar Olivos:
Creating a Security Culture Development Plan and a case study. 13-32 - Annette Sercombe, Maria Papadaki:
Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?. 33-39 - Francois Mouton, Mercia M. Malan, Hein S. Venter:
Development of Cognitive Functioning Psychological Measures for the SEADM. 40-51 - Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?. 52-63 - Ayako Komatsu, Daisuke Takagi, Toshihiko Takemura:
Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior. 64-74 - Cristian Thiago Moecke, Melanie Volkamer:
Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches. 75-85 - Lynn Futcher, Rossouw von Solms:
SecSDM: A usable tool to support IT undergraduate students in secure software development. 86-96 - Alexandros Yeratziotis, Darelle van Greunen, Dalenca Pottas:
A Framework for Evaluating Usable Security: The Case of Online Health Social Networks . 97-107 - Donovan Isherwood, Marijke Coetzee, Jan H. P. Eloff:
Towards trust and reputation for e-commerce in collectivist rural Africa. 108-118 - Paul Stephens:
An Evaluation of Linux Cybercrime Forensics Courses for European Law Enforcement. 119-128 - Teodor Sommestad, Amund Hunstad:
Intrusion detection and the role of the system administrator. 129-138 - Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos:
User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. 139-149 - Alexandra Maria Varka, Vasilios Katos:
On the user acceptance of graphical passwords. 150-159 - Adeeb Alnajjar, Helge Janicke:
Multi-Factor Authentication Using Hardware Information and User Profiling Techniques. 160-173 - Ken-ichi Hanamura, Toshihiko Takemura, Ayako Komatsu:
Analysis of Characteristics of Victims in Information Security Incidents: The Case of Japanese Internet Users. 174-184 - Adnan Ahmad, Brian Whitworth, Lech J. Janczewski:
Dynamic Rights Reallocation In Social Networks. 185-194 - Dimitrios Michalopoulos, Ioannis Mavridis:
Utilizing Survival Analysis for Modeling Child Hazards of Social Networking. 195-204 - Noluxolo Kortjan, Rossouw von Solms, Johan Van Niekerk:
Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations. 205-215
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.