Table of Contents
|
Human Aspects of Information Security and Assurance Nathan Clarke, Steven M. Furnell |
Front Matter |
Management and Risk
|
Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality Tobias Reittinger, Magdalena Glas, Sarah Aminzada, Günther Pernul |
3-16 |
Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector Noluhle Makhubalo, Dirk Snyman |
17-31 |
Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists Samantha Phillips, Malte Hansen, Amukelani Matsilele |
32-46 |
A Diary Study to Understand Young Saudi Adult Users’ Experiences of Online Security Threats Najla Aldaraani, Helen Petrie, Siamak Shahandashti |
47-60 |
Investigating the Factors Influencing Individuals’ Self-sovereign Identity Adoption Intentions James Clark, Zainab Ruhwanya |
61-78 |
“There is a Damn Hello on the Social Media!” Insights into Public Risk Communication in the Digital Age Christine Große |
79-92 |
A Profile-Based Cyber Security Readiness Assessment Framework at Country Level Raymond Agyemang, Steven Furnell, Tim Muller |
93-106 |
To Risk Analyse, or Not to Risk Analyse: That’s the Question Erik Bergström, Simon Andersson, Martin Lundgren |
107-119 |
Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review Rose-Mharie Åhlfeldt, Emelie Mannebäck |
120-133 |
Information Security Management in Digitized Identity Systems Salim Awudu, Sotirios Terzis |
134-147 |
Assessing Cyber Security Support for Small and Medium-Sized Enterprises Neeshe Khan, Steven Furnell, Maria Bada, Jason Nurse, Matthew Rand |
148-162 |
Social Engineering
|
A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks Nathan Monsoro, Célia Martinie, Philippe Palanque, Théo Saubanère |
165-179 |
Defining Measures of Effect for Disinformation Attacks Carlo Kopp |
180-199 |
Phish and Tips: Stella Kazamia, Chris Culnane, Daniel Gardham, Suzanne Prior, Helen Treharne |
200-214 |
Literature Review: Misconceptions About Phishing Mattia Mossano, Melanie Volkamer |
215-228 |
Technical Attacks and Defenses
|
Linux Kernel Keyloggers and Information Security Louis Hassett, Daniel Ogwok |
231-242 |
The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry J. Scott-King, Zainab Ruhwanya |
243-263 |
An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack Tristen Amador, Roberta Mancuso, Steven Fulton, Erik Moore, Daniel Likarish |
264-277 |
Research Agenda for Speaker Authentication Ebenhaeser Rensburg, Reinhardt A. Botha, Bertram Haskins |
278-291 |
Usable Security
|
A Unified Privacy and Permission Management Framework Nourah Alshomrani, Steven Furnell, Helena Webb |
295-307 |
Understanding Users’ Mental Models of Federated Identity Management (FIM): Use of a New Tangible Elicitation Method Helen Petrie, Gayathri Sreekumar, Siamak Shahandashti |
308-322 |
Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden Joakim Kävrestad, Richard Fernow, David Lööf, Marcus Birath |
323-338 |
Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations Patrick Shirazi, Ali Padyab |
339-354 |
Assessing the Cybersecurity Needs and Experiences of Disabled Users Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, Naomi Woods, Darren Chadwick, Chris Fullwood, Xavier Carpent, Nicolas Gervassis |
355-369 |