Table of Contents
|
Human Aspects of Information Security and Assurance Steven Furnell, Nathan Clarke |
Front Matter |
Attitudes and Perspectives
|
Cyber Security in Healthcare Organisations Dhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver |
3-11 |
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? Jesper Holgersson, Joakim Kävrestad, Marcus Nohlberg |
12-21 |
Exploring Experiences of Using SETA in Nordic Municipalities Aous Al Salek, Joakim Kävrestad, Marcus Nohlberg |
22-31 |
Cyber Security Education
|
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education Alice Jaffray, Conor Finn, Jason Nurse |
35-45 |
A Reference Point for Designing a Cybersecurity Curriculum for Universities Adéle Da Veiga, Elisha Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Peeha Machaka |
46-62 |
A Conceptual Information Security Culture Framework for Higher Learning Institutions Charles Mawutor Ocloo, Adéle Da Veiga, Jan Kroeze |
63-80 |
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schools Martin Sparrius, Moufida Sadok, Peter Bednar |
81-90 |
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children D. P. Snyman, Günther R. Drevin, Hennie A. Kruger, Lynette Drevin, Johann Allers |
91-101 |
Evaluation Strategies for Cybersecurity Training Methods: A Literature Review Joakim Kävrestad, Marcus Nohlberg |
102-112 |
People and Technology
|
When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devices Sarah Turner, Jason Nurse, Shujun Li |
115-126 |
Making Access Control Easy in IoT Vafa Andalibi, Jayati Dev, Donginn Kim, Eliot Lear, L. Jean Camp |
127-137 |
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation Daniel Hulatt, Eliana Stavrou |
138-147 |
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing Max Clasen, Fudong Li, David Williams |
148-163 |
Towards a Risk Assessment Matrix for Information Security Workarounds Eugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher |
164-178 |
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon Keshnee Padayachee |
179-188 |
A Literature Review on Virtual Reality Authentication John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das |
189-198 |
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints Lee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray |
199-210 |
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords Paul Brockbanks, Martin J. Butler |
211-222 |