index - Human Aspects of Information Security and Assurance Access content directly

Full Text Documents

Chargement de la page


Chargement de la page

Table of Contents
Human Aspects of Information Security and Assurance
Steven Furnell, Nathan Clarke
Front Matter

Attitudes and Perspectives

Cyber Security in Healthcare Organisations
Dhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?
Jesper Holgersson, Joakim Kävrestad, Marcus Nohlberg
Exploring Experiences of Using SETA in Nordic Municipalities
Aous Al Salek, Joakim Kävrestad, Marcus Nohlberg

Cyber Security Education

SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education
Alice Jaffray, Conor Finn, Jason Nurse
A Reference Point for Designing a Cybersecurity Curriculum for Universities
Adéle Da Veiga, Elisha Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Peeha Machaka
A Conceptual Information Security Culture Framework for Higher Learning Institutions
Charles Mawutor Ocloo, Adéle Da Veiga, Jan Kroeze
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schools
Martin Sparrius, Moufida Sadok, Peter Bednar
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children
D. P. Snyman, Günther R. Drevin, Hennie A. Kruger, Lynette Drevin, Johann Allers
Evaluation Strategies for Cybersecurity Training Methods: A Literature Review
Joakim Kävrestad, Marcus Nohlberg

People and Technology

When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devices
Sarah Turner, Jason Nurse, Shujun Li
Making Access Control Easy in IoT
Vafa Andalibi, Jayati Dev, Donginn Kim, Eliot Lear, L. Jean Camp
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation
Daniel Hulatt, Eliana Stavrou
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing
Max Clasen, Fudong Li, David Williams
Towards a Risk Assessment Matrix for Information Security Workarounds
Eugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon
Keshnee Padayachee
A Literature Review on Virtual Reality Authentication
John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints
Lee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords
Paul Brockbanks, Martin J. Butler



Designed by Inria-IES Team :    Hosted by HAL :