Full Text Documents

24

Search


Table of Contents
Human Aspects of Information Security and Assurance
Nathan Clarke, Steven M. Furnell
Front Matter

Management and Risk


Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality
Tobias Reittinger, Magdalena Glas, Sarah Aminzada, Günther Pernul
3-16
Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector
Noluhle Makhubalo, Dirk Snyman
17-31
Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists
Samantha Phillips, Malte Hansen, Amukelani Matsilele
32-46
A Diary Study to Understand Young Saudi Adult Users’ Experiences of Online Security Threats
Najla Aldaraani, Helen Petrie, Siamak Shahandashti
47-60
Investigating the Factors Influencing Individuals’ Self-sovereign Identity Adoption Intentions
James Clark, Zainab Ruhwanya
61-78
“There is a Damn Hello on the Social Media!” Insights into Public Risk Communication in the Digital Age
Christine Große
79-92
A Profile-Based Cyber Security Readiness Assessment Framework at Country Level
Raymond Agyemang, Steven Furnell, Tim Muller
93-106
To Risk Analyse, or Not to Risk Analyse: That’s the Question
Erik Bergström, Simon Andersson, Martin Lundgren
107-119
Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review
Rose-Mharie Åhlfeldt, Emelie Mannebäck
120-133
Information Security Management in Digitized Identity Systems
Salim Awudu, Sotirios Terzis
134-147
Assessing Cyber Security Support for Small and Medium-Sized Enterprises
Neeshe Khan, Steven Furnell, Maria Bada, Jason Nurse, Matthew Rand
148-162

Social Engineering


A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks
Nathan Monsoro, Célia Martinie, Philippe Palanque, Théo Saubanère
165-179
Defining Measures of Effect for Disinformation Attacks
Carlo Kopp
180-199
Phish and Tips:
Stella Kazamia, Chris Culnane, Daniel Gardham, Suzanne Prior, Helen Treharne
200-214
Literature Review: Misconceptions About Phishing
Mattia Mossano, Melanie Volkamer
215-228

Technical Attacks and Defenses


Linux Kernel Keyloggers and Information Security
Louis Hassett, Daniel Ogwok
231-242
The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry
J. Scott-King, Zainab Ruhwanya
243-263
An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack
Tristen Amador, Roberta Mancuso, Steven Fulton, Erik Moore, Daniel Likarish
264-277
Research Agenda for Speaker Authentication
Ebenhaeser Rensburg, Reinhardt A. Botha, Bertram Haskins
278-291

Usable Security


A Unified Privacy and Permission Management Framework
Nourah Alshomrani, Steven Furnell, Helena Webb
295-307
Understanding Users’ Mental Models of Federated Identity Management (FIM): Use of a New Tangible Elicitation Method
Helen Petrie, Gayathri Sreekumar, Siamak Shahandashti
308-322
Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden
Joakim Kävrestad, Richard Fernow, David Lööf, Marcus Birath
323-338
Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations
Patrick Shirazi, Ali Padyab
339-354
Assessing the Cybersecurity Needs and Experiences of Disabled Users
Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, Naomi Woods, Darren Chadwick, Chris Fullwood, Xavier Carpent, Nicolas Gervassis
355-369

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/