Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Human Aspects of Information Security and Assurance
Steven Furnell, Nathan Clarke
Front Matter

Education and Training


Combating Digital Exclusion with Cybersecurity Training – An Interview Study with Swedish Seniors
Joakim Kävrestad, David Lindvall, Marcus Nohlberg
3-12
Another Look at Cybersecurity Awareness Programs
S. Solms, Jaco Du Toit, Elmarie Kritzinger
13-23
Cyber Range Exercises: Potentials and Open Challenges for Organizations
Magdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul
24-35
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula
Muwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou
36-52
Cybersecurity Training Acceptance: A Literature Review
Joakim Kävrestad, Wesam Fallatah, Steven Furnell
53-63
Cyber Security Awareness and Education Support for Home and Hybrid Workers
Fayez Alotaibi, Steven Furnell, Ying He
64-75
On-Campus Hands-On Ethical Hacking Course
Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil
76-90
Planning for Professional Development in Cybersecurity: A New Curriculum Design
Eliana Stavrou
91-104
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education
Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik
105-115
Key Elements for Cybersafety Education of Primary School Learners in South Africa
Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza
116-128
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitals in South Africa
Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo
129-142
Towards a Framework for the Personalization of Cybersecurity Awareness
S. Alotaibi, Steven Furnell, Y. He
143-153

Management, Policy and Skills


A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies’ Information Security Policies
Elham Rostami, Fredrik Karlsson
157-168
Business Language for Information Security
Dinh Uy Tran, Audun Jøsang
169-180
“Check, Check, Check, We Got Those” – Catalogue Use in Information Security Risk Management
Erik Bergström, Martin Lundgren, Karin Bernsmed, Guillaume Bour
181-191
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof
Armand Vorster, Adéle Da Veiga
192-210
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)
Tebogo Kesetse Lejaka, Adéle Da Veiga, Marianne Loock
211-224
Is Your CISO Burnt Out yet?
Andrew Reeves, Malcolm Pattinson, Marcus Butavicius
225-236
An Investigation into the Cybersecurity Skills Gap in South Africa
Michael De Jager, Lynn Futcher, Kerry-Lynn Thomson
237-248
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry
Kristian Kannelønning, Sokratis Katsikas
249-258

Evolving Threats and Attacks


It’s More Than Just Money: The Real-World Harms from Ransomware Attacks
Nandita Pattnaik, Jason Nurse, Sarah Turner, Gareth Mott, Jamie Maccoll, Pia Huesch, James Sullivan
261-274
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops
David Hedberg, Martin Lundgren, Marcus Nohlberg
275-284
Decreasing Physical Access Bottlenecks through Context-Driven Authentication
Khutso Lebea, Wai Sze Leung
285-295
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective
Urvashi Kishnani, Srinidhi Madabhushi, Sanchari Das
296-309
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender’s Address
Daniel Conway, Marcus Butavicius, Kun Yu, Fang Chen
310-323
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing
Rufai Ahmad, Sotirios Terzis, Karen Renaud
324-336
Six-Year Study of Emails Sent to Unverified Addresses
Alexander Joukov, Nikolai Joukov
337-345

Social-Technical Factors


Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats
Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell
349-363
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia
Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti
364-376
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks
Monica T. Whitty, Christopher Ruddy, David A. Keatley
377-390
Analyzing Cybersecurity Definitions for Non-experts
Lorenzo Neil, Julie M. Haney, Kerrianne Buchanan, Charlotte Healy
391-404
On using the Task Models for Validation and Evolution of Usable Security Design Patterns
Célia Martinie, Bilal Naqvi
405-417
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT
Tapiwa Gundu
418-431
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers
Sinazo Brown, Zainab Ruhwanya, Ayanda Pekane
432-444
The Influence of Interpersonal Factors on Telecommuting Employees’ Cybercrime Preventative Behaviours During the Pandemic
Tim Wright, Zainab Ruhwanya, Jacques Ophoff
445-458

Research Methods


A Review of Constructive Alignment in Information Security Educational Research
Vuyolwethu Mdunyelwa, Lynn Futcher, Johan Van Niekerk
461-469
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
470-481

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/