Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Human Aspects of Information Security and Assurance
Nathan Clarke, Steven Furnell
Front Matter

Cyber Security Education and Training


Visual Programming in Cyber Range Training to Improve Skill Development
Magdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul
3-13
Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Training
Joakim Kävrestad, Martin Gellerstedt, Marcus Nohlberg, Jana Rambusch
14-23
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa
Madri Kruger, Lynn Futcher, Kerry-Lynn Thomson
24-38
Applying PDCA to Security, Education, Training and Awareness Programs
Olivier de Casanove, Nicolas Leleu, and Florence Sèdes
39-48
Exploring CyBOK with Topic Modeling Techniques
Ana I. González-Tablas, Mohammed Rashed
49-65
COLTRANE – Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education
Jerry Andriessen, Steven Furnell, Gregor Langner, Carmela Luciano, Gerald Quirchmayr, Vittorio Scarano, Teemu Johannes Tokola
66-76
An Investigation into Educational Process Models for Teaching Secure Programming
Vuyolwethu Mdunyelwa, Lynn Futcher, Johan Van Niekerk
77-90
Cybersecurity Knowledge Requirements for a Water Sector Employee
R. Thomani, A. Marnewick, Suné Von von Solms, M. Malatji
91-105
CAP: Patching the Human Vulnerability
Thaddeus Eze, Neil Hawker
106-119
A Novel Framework for the Development of Age Appropriate Information Security Serious Games
Rudi Serfontein, Riana Serfontein
120-129

Cyber Security Culture


Security Culture in Industrial Control Systems Organisations: A Literature Review
Stefanos Evripidou, Uchenna D. Ani, Jeremy D Mck. Watson, Stephen Hailes
133-146
Systematic Review of Factors that Influence the Cybersecurity Culture
Emilia N. Mwim, Jabu Mtsweni
147-172
Cyber4Dev Security Culture Model for African Countries
Victor Reppoh, Adéle da Veiga
173-185
A Model for Information Security Culture with Innovation and Creativity as Enablers
Adéle da Veiga
186-196
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links
Rufai Ahmad, Sotirios Terzis
197-206

Privacy


How Privacy Concerns Impact Swedish Citizens’ Willingness to Report Crimes
Gunnar Lindqvist, Joakim Kävrestad
209-217
“Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?”
Anne Hennig, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer, Peter Mayer
218-227
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results
Leah Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley
228-239
Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart Home
Chola Chhetri, Vivian Motti
240-250

Cyber Security Management


An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective
Keshnee Padayachee
253-264
Policy Components - A Conceptual Model for Tailoring Information Security Policies
Elham Rostami, Fredrik Karlsson, Shang Gao
265-274
Security Fatigue: A Case Study of Data Specialists
Anusha Bhana, Jacques Ophoff
275-284
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities
Karabo Pilane, Zainab Ruhwanya, Irwin Brown
285-299
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti
300-309
PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator
Enock Samuel Mbewe, Taveesh Sharma, Josiah Chavula
310-327

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/