Table of Contents
|
Human Aspects of Information Security and Assurance Nathan Clarke, Steven Furnell |
Front Matter |
Cyber Security Education and Training
|
Visual Programming in Cyber Range Training to Improve Skill Development Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul |
3-13 |
Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Training Joakim Kävrestad, Martin Gellerstedt, Marcus Nohlberg, Jana Rambusch |
14-23 |
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa Madri Kruger, Lynn Futcher, Kerry-Lynn Thomson |
24-38 |
Applying PDCA to Security, Education, Training and Awareness Programs Olivier de Casanove, Nicolas Leleu, and Florence Sèdes |
39-48 |
Exploring CyBOK with Topic Modeling Techniques Ana I. González-Tablas, Mohammed Rashed |
49-65 |
COLTRANE – Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education Jerry Andriessen, Steven Furnell, Gregor Langner, Carmela Luciano, Gerald Quirchmayr, Vittorio Scarano, Teemu Johannes Tokola |
66-76 |
An Investigation into Educational Process Models for Teaching Secure Programming Vuyolwethu Mdunyelwa, Lynn Futcher, Johan Van Niekerk |
77-90 |
Cybersecurity Knowledge Requirements for a Water Sector Employee R. Thomani, A. Marnewick, Suné Von von Solms, M. Malatji |
91-105 |
CAP: Patching the Human Vulnerability Thaddeus Eze, Neil Hawker |
106-119 |
A Novel Framework for the Development of Age Appropriate Information Security Serious Games Rudi Serfontein, Riana Serfontein |
120-129 |
Cyber Security Culture
|
Security Culture in Industrial Control Systems Organisations: A Literature Review Stefanos Evripidou, Uchenna D. Ani, Jeremy D Mck. Watson, Stephen Hailes |
133-146 |
Systematic Review of Factors that Influence the Cybersecurity Culture Emilia N. Mwim, Jabu Mtsweni |
147-172 |
Cyber4Dev Security Culture Model for African Countries Victor Reppoh, Adéle da Veiga |
173-185 |
A Model for Information Security Culture with Innovation and Creativity as Enablers Adéle da Veiga |
186-196 |
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links Rufai Ahmad, Sotirios Terzis |
197-206 |
Privacy
|
How Privacy Concerns Impact Swedish Citizens’ Willingness to Report Crimes Gunnar Lindqvist, Joakim Kävrestad |
209-217 |
“Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?” Anne Hennig, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer, Peter Mayer |
218-227 |
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results Leah Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley |
228-239 |
Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart Home Chola Chhetri, Vivian Motti |
240-250 |
Cyber Security Management
|
An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective Keshnee Padayachee |
253-264 |
Policy Components - A Conceptual Model for Tailoring Information Security Policies Elham Rostami, Fredrik Karlsson, Shang Gao |
265-274 |
Security Fatigue: A Case Study of Data Specialists Anusha Bhana, Jacques Ophoff |
275-284 |
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities Karabo Pilane, Zainab Ruhwanya, Irwin Brown |
285-299 |
Online Security Attack Experience and Worries of Young Adults in the United Kingdom Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti |
300-309 |
PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator Enock Samuel Mbewe, Taveesh Sharma, Josiah Chavula |
310-327 |