Table of Contents
|
Human Aspects of Information Security and Assurance Steven Furnell, Nathan Clarke |
Front Matter |
Education and Training
|
Combating Digital Exclusion with Cybersecurity Training – An Interview Study with Swedish Seniors Joakim Kävrestad, David Lindvall, Marcus Nohlberg |
3-12 |
Another Look at Cybersecurity Awareness Programs S. Solms, Jaco Du Toit, Elmarie Kritzinger |
13-23 |
Cyber Range Exercises: Potentials and Open Challenges for Organizations Magdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul |
24-35 |
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula Muwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou |
36-52 |
Cybersecurity Training Acceptance: A Literature Review Joakim Kävrestad, Wesam Fallatah, Steven Furnell |
53-63 |
Cyber Security Awareness and Education Support for Home and Hybrid Workers Fayez Alotaibi, Steven Furnell, Ying He |
64-75 |
On-Campus Hands-On Ethical Hacking Course Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil |
76-90 |
Planning for Professional Development in Cybersecurity: A New Curriculum Design Eliana Stavrou |
91-104 |
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik |
105-115 |
Key Elements for Cybersafety Education of Primary School Learners in South Africa Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza |
116-128 |
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitals in South Africa Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo |
129-142 |
Towards a Framework for the Personalization of Cybersecurity Awareness S. Alotaibi, Steven Furnell, Y. He |
143-153 |
Management, Policy and Skills
|
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies Elham Rostami, Fredrik Karlsson |
157-168 |
Business Language for Information Security Dinh Uy Tran, Audun Jøsang |
169-180 |
“Check, Check, Check, We Got Those” – Catalogue Use in Information Security Risk Management Erik Bergström, Martin Lundgren, Karin Bernsmed, Guillaume Bour |
181-191 |
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof Armand Vorster, Adéle Da Veiga |
192-210 |
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs) Tebogo Kesetse Lejaka, Adéle Da Veiga, Marianne Loock |
211-224 |
Is Your CISO Burnt Out yet? Andrew Reeves, Malcolm Pattinson, Marcus Butavicius |
225-236 |
An Investigation into the Cybersecurity Skills Gap in South Africa Michael De Jager, Lynn Futcher, Kerry-Lynn Thomson |
237-248 |
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry Kristian Kannelønning, Sokratis Katsikas |
249-258 |
Evolving Threats and Attacks
|
It’s More Than Just Money: The Real-World Harms from Ransomware Attacks Nandita Pattnaik, Jason Nurse, Sarah Turner, Gareth Mott, Jamie Maccoll, Pia Huesch, James Sullivan |
261-274 |
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops David Hedberg, Martin Lundgren, Marcus Nohlberg |
275-284 |
Decreasing Physical Access Bottlenecks through Context-Driven Authentication Khutso Lebea, Wai Sze Leung |
285-295 |
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective Urvashi Kishnani, Srinidhi Madabhushi, Sanchari Das |
296-309 |
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender’s Address Daniel Conway, Marcus Butavicius, Kun Yu, Fang Chen |
310-323 |
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing Rufai Ahmad, Sotirios Terzis, Karen Renaud |
324-336 |
Six-Year Study of Emails Sent to Unverified Addresses Alexander Joukov, Nikolai Joukov |
337-345 |
Social-Technical Factors
|
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell |
349-363 |
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti |
364-376 |
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks Monica T. Whitty, Christopher Ruddy, David A. Keatley |
377-390 |
Analyzing Cybersecurity Definitions for Non-experts Lorenzo Neil, Julie M. Haney, Kerrianne Buchanan, Charlotte Healy |
391-404 |
On using the Task Models for Validation and Evolution of Usable Security Design Patterns Célia Martinie, Bilal Naqvi |
405-417 |
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT Tapiwa Gundu |
418-431 |
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers Sinazo Brown, Zainab Ruhwanya, Ayanda Pekane |
432-444 |
The Influence of Interpersonal Factors on Telecommuting Employees’ Cybercrime Preventative Behaviours During the Pandemic Tim Wright, Zainab Ruhwanya, Jacques Ophoff |
445-458 |
Research Methods
|
A Review of Constructive Alignment in Information Security Educational Research Vuyolwethu Mdunyelwa, Lynn Futcher, Johan Van Niekerk |
461-469 |
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research Marcus Gerdin, Åke Grönlund, Ella Kolkowska |
470-481 |