Filter your results
- 89
- 1
- 88
- 1
- 1
- 90
- 10
- 46
- 8
- 8
- 11
- 3
- 9
- 5
- 8
- 4
- 20
- 2
- 6
- 6
- 90
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 10
- 9
- 5
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Information Security Sharing of Networked Medical Organizations: Case Study of Remote Diagnostic ImagingFirst IMIA/IFIP Joint Symposium on E-Health (E-HEALTH) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.90-101, ⟨10.1007/978-3-642-15515-4_10⟩
Conference papers
hal-01054869v1
|
||
|
Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Dec 2016, Vienna, Austria. pp.127-141, ⟨10.1007/978-3-319-49944-4_10⟩
Conference papers
hal-01630544v1
|
||
|
ContextBased MicroTraining: A Framework for Information Security Training14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.71-81, ⟨10.1007/978-3-030-57404-8_6⟩
Conference papers
hal-03657726v1
|
||
|
Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula8th World Conference on Information Security Education (WISE), Jun 2011, Lucerne, Switzerland. pp.164-171, ⟨10.1007/978-3-642-39377-8_18⟩
Conference papers
hal-01463616v1
|
||
|
An Enterprise Anti-phishing Framework8th World Conference on Information Security Education (WISE), Jun 2011, Lucerne, Switzerland. pp.196-203, ⟨10.1007/978-3-642-39377-8_22⟩
Conference papers
hal-01463630v1
|
||
|
Social Groupings and Information Security Obedience Within Organizations30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.325-338, ⟨10.1007/978-3-319-18467-8_22⟩
Conference papers
hal-01345118v1
|
||
|
Challenges for Knowledge Management in the Context of IT Global Sourcing Models Implementation2nd IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KM), Sep 2014, Warsaw, Poland. pp.58-74, ⟨10.1007/978-3-319-28868-0_4⟩
Conference papers
hal-01369801v1
|
||
|
Introducing Mobile Network Security Experiments to Communication Technology Education10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.74-83, ⟨10.1007/978-3-319-58553-6_7⟩
Conference papers
hal-01690971v1
|
||
|
Demographic Factors in Cyber Security: An Empirical Study18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.667-676, ⟨10.1007/978-3-030-29374-1_54⟩
Conference papers
hal-02510112v1
|
||
|
Two Approaches to Information Security Doctoral Research8th World Conference on Information Security Education (WISE), Jun 2011, Lucerne, Switzerland. pp.172-179, ⟨10.1007/978-3-642-39377-8_19⟩
Conference papers
hal-01463619v1
|
||
|
Aggregating Corporate Information Security Maturity Levels of Different Assets14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.376-392, ⟨10.1007/978-3-030-42504-3_24⟩
Conference papers
hal-03378962v1
|
||
|
A Structured Comparison of the Corporate Information Security Maturity Level34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.223-237, ⟨10.1007/978-3-030-22312-0_16⟩
Conference papers
hal-03744289v1
|
||
|
Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the purpose of Information Security Education for Organizational End-usersIFIP TC 3 International Conference on Key Competencies in the Knowledge Society (KCKS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.412-423, ⟨10.1007/978-3-642-15378-5_40⟩
Conference papers
hal-01054721v1
|
||
|
Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security11th IFIP World Conference on Information Security Education (WISE), Sep 2018, Poznan, Poland. pp.108-120, ⟨10.1007/978-3-319-99734-6_9⟩
Conference papers
hal-02125764v1
|
||
|
Business Continuity and Information Security Maintenance" Masters’ Training Program8th World Conference on Information Security Education (WISE), Jul 2013, Auckland, New Zealand. pp.95-102, ⟨10.1007/978-3-642-39377-8_10⟩
Conference papers
hal-01463592v1
|
||
|
Tensions that Hinder the Implementation of Digital Security Governance36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.430-445, ⟨10.1007/978-3-030-78120-0_28⟩
Conference papers
hal-03746037v1
|
||
|
Information Security and Open Source Dual Use Security Software: Trust Paradox9th Open Source Software (OSS), Jun 2013, Koper-Capodistria, Slovenia. pp.194-206, ⟨10.1007/978-3-642-38928-3_14⟩
Conference papers
hal-01467570v1
|
||
|
Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.133-143, ⟨10.1007/978-3-030-57404-8_11⟩
Conference papers
hal-03657715v1
|
||
|
ISO/IEC Competence Requirements for Information Security Professionals10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.135-146, ⟨10.1007/978-3-319-58553-6_12⟩
Conference papers
hal-01690957v1
|
||
|
Using Actor Network Theory to Understand Information Security Management25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.43-54, ⟨10.1007/978-3-642-15257-3_5⟩
Conference papers
hal-01054504v1
|
||
|
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.257-271, ⟨10.1007/978-3-642-39218-4_20⟩
Conference papers
hal-01463832v1
|
||
|
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.144-157, ⟨10.1007/978-3-030-57404-8_12⟩
Conference papers
hal-03657707v1
|
||
|
Lessons Learned from an Organizational Information Security Awareness Campaign12th IFIP World Conference on Information Security Education (WISE), Jun 2019, Lisbon, Portugal. pp.129-142, ⟨10.1007/978-3-030-23451-5_10⟩
Conference papers
hal-02365728v1
|
||
|
Security Levels for Web Authentication Using Mobile Phones6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.130-143, ⟨10.1007/978-3-642-20769-3_11⟩
Conference papers
hal-01559465v1
|
||
|
Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.297-308, ⟨10.1007/978-3-319-33936-8_23⟩
Conference papers
hal-01434859v1
|
||
|
HyperSec: Visual Analytics for Blockchain Security Monitoring36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.165-180, ⟨10.1007/978-3-030-78120-0_11⟩
Conference papers
hal-03746036v1
|
||
|
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.417-430, ⟨10.1007/978-3-642-55415-5_35⟩
Conference papers
hal-01370389v1
|
||
|
Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.238-252, ⟨10.1007/978-3-030-22312-0_17⟩
Conference papers
hal-03744297v1
|
||
|
Andragogy as a Scientific Basis for Training Professionals in Information Security12th IFIP World Conference on Information Security Education (WISE), Jun 2019, Lisbon, Portugal. pp.72-85, ⟨10.1007/978-3-030-23451-5_6⟩
Conference papers
hal-02365727v1
|
||
|
An Approach to Information Security Policy Modeling for Enterprise Networks15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.118-127, ⟨10.1007/978-3-662-44885-4_10⟩
Conference papers
hal-01404201v1
|