Full Text Documents

37

Search


Table of Contents
Human Aspects of Information Security and Assurance
Steven Furnell, Nathan Clarke
Front Matter

Education and Training


Combating Digital Exclusion with Cybersecurity Training – An Interview Study with Swedish Seniors
Joakim Kävrestad, David Lindvall, Marcus Nohlberg
3-12
Another Look at Cybersecurity Awareness Programs
S. Solms, Jaco Du Toit, Elmarie Kritzinger
13-23
Cyber Range Exercises: Potentials and Open Challenges for Organizations
Magdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul
24-35
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula
Muwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou
36-52
Cybersecurity Training Acceptance: A Literature Review
Joakim Kävrestad, Wesam Fallatah, Steven Furnell
53-63
Cyber Security Awareness and Education Support for Home and Hybrid Workers
Fayez Alotaibi, Steven Furnell, Ying He
64-75
On-Campus Hands-On Ethical Hacking Course
Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil
76-90
Planning for Professional Development in Cybersecurity: A New Curriculum Design
Eliana Stavrou
91-104
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education
Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik
105-115
Key Elements for Cybersafety Education of Primary School Learners in South Africa
Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza
116-128
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitals in South Africa
Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo
129-142
Towards a Framework for the Personalization of Cybersecurity Awareness
S. Alotaibi, Steven Furnell, Y. He
143-153

Management, Policy and Skills


A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies
Elham Rostami, Fredrik Karlsson
157-168
Business Language for Information Security
Dinh Uy Tran, Audun Jøsang
169-180
“Check, Check, Check, We Got Those” – Catalogue Use in Information Security Risk Management
Erik Bergström, Martin Lundgren, Karin Bernsmed, Guillaume Bour
181-191
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof
Armand Vorster, Adéle Da Veiga
192-210
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)
Tebogo Kesetse Lejaka, Adéle Da Veiga, Marianne Loock
211-224
Is Your CISO Burnt Out yet?
Andrew Reeves, Malcolm Pattinson, Marcus Butavicius
225-236
An Investigation into the Cybersecurity Skills Gap in South Africa
Michael De Jager, Lynn Futcher, Kerry-Lynn Thomson
237-248
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry
Kristian Kannelønning, Sokratis Katsikas
249-258

Evolving Threats and Attacks


It’s More Than Just Money: The Real-World Harms from Ransomware Attacks
Nandita Pattnaik, Jason Nurse, Sarah Turner, Gareth Mott, Jamie Maccoll, Pia Huesch, James Sullivan
261-274
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops
David Hedberg, Martin Lundgren, Marcus Nohlberg
275-284
Decreasing Physical Access Bottlenecks through Context-Driven Authentication
Khutso Lebea, Wai Sze Leung
285-295
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective
Urvashi Kishnani, Srinidhi Madabhushi, Sanchari Das
296-309
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender’s Address
Daniel Conway, Marcus Butavicius, Kun Yu, Fang Chen
310-323
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing
Rufai Ahmad, Sotirios Terzis, Karen Renaud
324-336
Six-Year Study of Emails Sent to Unverified Addresses
Alexander Joukov, Nikolai Joukov
337-345

Social-Technical Factors


Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats
Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell
349-363
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia
Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti
364-376
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks
Monica T. Whitty, Christopher Ruddy, David A. Keatley
377-390
Analyzing Cybersecurity Definitions for Non-experts
Lorenzo Neil, Julie M. Haney, Kerrianne Buchanan, Charlotte Healy
391-404
On using the Task Models for Validation and Evolution of Usable Security Design Patterns
Célia Martinie, Bilal Naqvi
405-417
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT
Tapiwa Gundu
418-431
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers
Sinazo Brown, Zainab Ruhwanya, Ayanda Pekane
432-444
The Influence of Interpersonal Factors on Telecommuting Employees’ Cybercrime Preventative Behaviours During the Pandemic
Tim Wright, Zainab Ruhwanya, Jacques Ophoff
445-458

Research Methods


A Review of Constructive Alignment in Information Security Educational Research
Vuyolwethu Mdunyelwa, Lynn Futcher, Johan Van Niekerk
461-469
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
470-481

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/