Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Human Aspects of Information Security and Assurance
Nathan Clarke, Steven M. Furnell
Front Matter

Management and Risk


Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality
Tobias Reittinger, Magdalena Glas, Sarah Aminzada, Günther Pernul
3-16
Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector
Noluhle Makhubalo, Dirk Snyman
17-31
Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists
Samantha Phillips, Malte Hansen, Amukelani Matsilele
32-46
A Diary Study to Understand Young Saudi Adult Users’ Experiences of Online Security Threats
Najla Aldaraani, Helen Petrie, Siamak Shahandashti
47-60
Investigating the Factors Influencing Individuals’ Self-sovereign Identity Adoption Intentions
James Clark, Zainab Ruhwanya
61-78
“There is a Damn Hello on the Social Media!” Insights into Public Risk Communication in the Digital Age
Christine Große
79-92
A Profile-Based Cyber Security Readiness Assessment Framework at Country Level
Raymond Agyemang, Steven Furnell, Tim Muller
93-106
To Risk Analyse, or Not to Risk Analyse: That’s the Question
Erik Bergström, Simon Andersson, Martin Lundgren
107-119
Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review
Rose-Mharie Åhlfeldt, Emelie Mannebäck
120-133
Information Security Management in Digitized Identity Systems
Salim Awudu, Sotirios Terzis
134-147
Assessing Cyber Security Support for Small and Medium-Sized Enterprises
Neeshe Khan, Steven Furnell, Maria Bada, Jason Nurse, Matthew Rand
148-162

Social Engineering


A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks
Nathan Monsoro, Célia Martinie, Philippe Palanque, Théo Saubanère
165-179
Defining Measures of Effect for Disinformation Attacks
Carlo Kopp
180-199
Phish and Tips:
Stella Kazamia, Chris Culnane, Daniel Gardham, Suzanne Prior, Helen Treharne
200-214
Literature Review: Misconceptions About Phishing
Mattia Mossano, Melanie Volkamer
215-228

Technical Attacks and Defenses


Linux Kernel Keyloggers and Information Security
Louis Hassett, Daniel Ogwok
231-242
The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry
J. Scott-King, Zainab Ruhwanya
243-263
An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack
Tristen Amador, Roberta Mancuso, Steven Fulton, Erik Moore, Daniel Likarish
264-277
Research Agenda for Speaker Authentication
Ebenhaeser Rensburg, Reinhardt A. Botha, Bertram Haskins
278-291

Usable Security


A Unified Privacy and Permission Management Framework
Nourah Alshomrani, Steven Furnell, Helena Webb
295-307
Understanding Users’ Mental Models of Federated Identity Management (FIM): Use of a New Tangible Elicitation Method
Helen Petrie, Gayathri Sreekumar, Siamak Shahandashti
308-322
Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden
Joakim Kävrestad, Richard Fernow, David Lööf, Marcus Birath
323-338
Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations
Patrick Shirazi, Ali Padyab
339-354
Assessing the Cybersecurity Needs and Experiences of Disabled Users
Arwa Binsedeeq, Steven Furnell, Kirsi Helkala, Naomi Woods, Darren Chadwick, Chris Fullwood, Xavier Carpent, Nicolas Gervassis
355-369

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/