Table of Contents
|
Human Aspects of Information Security and Assurance Nathan Clarke, Steven Furnell |
Front Matter |
Privacy and COVID-19
|
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? Leah Shanley, Michael Johnstone, Michael Crowley, Patryk Szewczyk |
3-15 |
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa Adéle Veiga, Jacques Ophoff |
16-29 |
A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone Applications Georgios Magklaras, Lucia López-Bojórquez |
30-44 |
Awareness and Training
|
Towards a Cross-Cultural Education Framework for Online Safety Awareness R. Herkanaidu, S. Furnell, M. Papadaki |
47-57 |
Towards an Heuristic Approach to Cybersecurity and Online Safety Pedagogy Simon Marsden |
58-70 |
ContextBased MicroTraining: A Framework for Information Security Training Joakim Kävrestad, Marcus Nohlberg |
71-81 |
Social Engineering
|
Employees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test Mohammed Alotaibi |
85-96 |
Does Ubuntu Influence Social Engineering Susceptibility? Ntsewa Mokobane, Reinhardt Botha |
97-108 |
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory P. Unchit, S. Das, A. Kim, L. Camp |
109-120 |
Security Behaviour
|
KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children Esra Alkhamis, Helen Petrie, Karen Renaud |
123-132 |
Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework D. Snyman, H. Kruger |
133-143 |
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory Yotamu Gangire, Adéle Veiga, Marlien Herselman |
144-157 |
Education
|
Addressing SME Characteristics for Designing Information Security Maturity Models Bilge Yigit Ozkan, Marco Spruit |
161-174 |
Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships Ismini Vasileiou |
175-185 |
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction Dean Schoultz, Kerry-Lynn Thomson, Johan Niekerk |
186-207 |
End-User Security
|
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices B. Momenzadeh, S. Gopavaram, S. Das, L. Camp |
211-223 |
Exploring Information Security and Domestic Equality Marcus Nohlberg, Joakim Kävrestad |
224-232 |
Responding to KRACK: Wi-Fi Security Awareness in Private Households Jan Freudenreich, Jake Weidman, Jens Grossklags |
233-243 |
Usable Security
|
Exploring the Meaning of “Usable Security” Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg |
247-258 |
Dyslexia and Password Usage: Accessibility in Authentication Design Karen Renaud, Graham Johnson, Jacques Ophoff |
259-268 |
Securing User eXperience: A Review for the End-Users’ Software Robustness Panagiotis Zagouras, Christos Kalloniatis |
269-285 |
Security Policy
|
SMEs’ Confidentiality Concerns for Security Information Sharing Alireza Shojaifar, Samuel Fricker |
289-299 |
Validation of an Information Privacy Perception Instrument at a Zimbabwean University Kudakwashe Maguraushe, Adéle Veiga, Nico Martins |
300-314 |
Are We Really Informed on the Rights GDPR Guarantees? Maria Sideri, Stefanos Gritzalis |
315-326 |
Attitudes and Perceptions
|
“Most Companies Share Whatever They Can to Make Money!”: Comparing User’s Perceptions with the Data Practices of IoT Devices Mahdi Al-Ameen, Apoorva Chauhan, M. Ahsan, Huzeyfe Kocabas |
329-340 |
Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement Joseph Williams, Paul Stephens |
341-352 |
Critical Analysis of Information Security Culture Definitions Zainab Ruhwanya, Jacques Ophoff |
353-365 |