


default search action
16th HAISA 2022: Mytilene, Lesbos, Greece
- Nathan L. Clarke

, Steven Furnell
:
Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings. IFIP Advances in Information and Communication Technology 658, Springer 2022, ISBN 978-3-031-12171-5
Cyber Security Education and Training
- Magdalena Glas

, Manfred Vielberth
, Tobias Reittinger
, Fabian Böhm
, Günther Pernul
:
Visual Programming in Cyber Range Training to Improve Skill Development. 3-13 - Joakim Kävrestad

, Martin Gellerstedt
, Marcus Nohlberg
, Jana Rambusch:
Survey of Users' Willingness to Adopt and Pay for Cybersecurity Training. 14-23 - Madri Kruger

, Lynn Futcher
, Kerry-Lynn Thomson
:
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa. 24-38 - Olivier de Casanove, Nicolas Leleu, Florence Sèdes:

Applying PDCA to Security, Education, Training and Awareness Programs. 39-48 - Ana I. González-Tablas

, Mohammed Rashed
:
Exploring CyBOK with Topic Modeling Techniques. 49-65 - Jerry Andriessen

, Steven Furnell
, Gregor Langner
, Carmela Luciano
, Gerald Quirchmayr
, Vittorio Scarano
, Teemu Johannes Tokola
:
COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education. 66-76 - Vuyolwethu Sizoli Mdunyelwa

, Lynn Futcher
, Johan Van Niekerk
:
An Investigation into Educational Process Models for Teaching Secure Programming. 77-90 - R. Thomani, Annlizé Marnewick, Suné von Solms, Masike Malatji

:
Cybersecurity Knowledge Requirements for a Water Sector Employee. 91-105 - Thaddeus Eze, Neil Hawker:

CAP: Patching the Human Vulnerability. 106-119 - Rudi Serfontein

, Riana Serfontein
:
A Novel Framework for the Development of Age Appropriate Information Security Serious Games. 120-129
Cyber Security Culture
- Stefanos Evripidou

, Uchenna Daniel Ani, Jeremy D. McK. Watson, Stephen Hailes:
Security Culture in Industrial Control Systems Organisations: A Literature Review. 133-146 - Emilia N. Mwim, Jabu Mtsweni:

Systematic Review of Factors that Influence the Cybersecurity Culture. 147-172 - Victor Reppoh

, Adéle da Veiga
:
Cyber4Dev Security Culture Model for African Countries. 173-185 - Adéle da Veiga

:
A Model for Information Security Culture with Innovation and Creativity as Enablers. 186-196 - Rufai Ahmad

, Sotirios Terzis
:
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links. 197-206
Privacy
- Gunnar Lindqvist

, Joakim Kävrestad
:
How Privacy Concerns Impact Swedish Citizens' Willingness to Report Crimes. 209-217 - Anne Hennig

, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer
, Peter Mayer
:
"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?". 218-227 - Leah Shanley, Michael N. Johnstone

, Patryk Szewczyk
, Michael Crowley:
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results. 228-239 - Chola Chhetri

, Vivian Motti
:
Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart Home. 240-250
Cyber Security Management
- Keshnee Padayachee

:
An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective. 253-264 - Elham Rostami, Fredrik Karlsson

, Shang Gao
:
Policy Components - A Conceptual Model for Tailoring Information Security Policies. 265-274 - Anusha Bhana, Jacques Ophoff

:
Security Fatigue: A Case Study of Data Specialists. 275-284 - Karabo Pilane, Zainab Ruhwanya

, Irwin Brown
:
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities. 285-299 - Najla Aldaraani

, Helen Petrie
, Siamak F. Shahandashti
:
Online Security Attack Experience and Worries of Young Adults in the United Kingdom. 300-309 - Enock Samuel Mbewe

, Taveesh Sharma, Josiah Chavula
:
PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator. 310-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














