Table of Contents
|
Human Aspects of Information Security and Assurance Nathan Clarke, Steven M. Furnell |
Front Matter |
Awareness and Education
|
The Influence of Human Factors on Adaptive Social Media Cybersecurity Training and Education Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell |
3-15 |
Towards an Active Learning Approach for the Design of a Secure Programming Course Using Constructive Alignment Vuyolwethu Mdunyelwa, Lynn Futcher, Johan Van Niekerk |
16-30 |
Investigating the Use of Indigenous Languages Within South African Schools to Teach Cyber-Safety Awareness Amukelani Lisa Nkuna, Elmarie Kritzinger |
31-46 |
Useful but for Someone Else - An Explorative Study on Cybersecurity Training Acceptance Joakim Kävrestad, Erik Bergström, Eliana Stavrou, Marcus Nohlberg |
47-60 |
Laying the Foundation for Digital Citizenship: The Integration of ‘The CyberSmart Squad’ into a Pre-School Curriculum Kerry-Lynn Thomson, Noluxolo Gcaza |
61-73 |
Gamification in Cybersecurity Training: High-Level Properties of Cybersecurity Games Victoria Marciano, Jaco Du Toit, Rhulani Maluleka |
74-87 |
A Framework for Matching Distinct Personality Types with Information Security Awareness Methods Veronika Jashari, Satu Björn, Ella Kolkowska, Shang Gao |
88-100 |
“Probably Put Some Sort of Fear in”: Investigating the Role of Heuristics in Cyber Awareness Messaging for Small to Medium Sized Enterprises Dominic Button, Jacques Ophoff, Alastair Irons, Sharon Mcdonald |
101-115 |
Improving the Human Firewall: Exploring the Factors that Influence Cyber-Security Incident Reporting Kristiina Ahola, Daniel Sturman, Nadia Scott, Malcolm Pattinson, Andrew Reeves, Marcus Butavicius, Agata Mccormac |
116-129 |
Harnessing the Right Talent for SETA Programs: Cybersecurity Roles and Competencies that Make a Difference Apostolos Charalambous, Eliana Stavrou |
130-144 |
Privacy
|
Privacy Policies on Websites: A Case Study in the Financial Industry in South Africa Alisa Dayanand, Adéle Da Veiga |
147-167 |
Analysing Websites Privacy Policies: A Study of E-commerce Websites in South Africa Dzunani Makhuvele, Adéle Da Veiga |
168-183 |
Security and Privacy Perspectives on Using ChatGPT at the Workplace: An Interview Study Angelika Kimbel, Magdalena Glas, Günther Pernul |
184-197 |
A Holistic Approach to Developing Intervention Strategies Against Digital Piracy Nompilo Fakude, Elmarie Kritzinger |
198-212 |
Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data Andrew Reeves, Arash Shaghaghi, Shiri Krebs, Debi Ashenden |
213-227 |