Search - IFIP Open Digital Library Access content directly

Filter your results

90 results
level0_domain_s : Computer Science [cs]
Keywords : Information security
Image document

Information Security Sharing of Networked Medical Organizations: Case Study of Remote Diagnostic Imaging

Masayo Fujimoto , Koji Takeda , Tae Honma , Toshiaki Kawazoe , Noriko Aida , et al.
First IMIA/IFIP Joint Symposium on E-Health (E-HEALTH) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.90-101, ⟨10.1007/978-3-642-15515-4_10⟩
Conference papers hal-01054869v1
Image document

Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations

Edward Bernroider , Sebastian Margiol , Alfred Taudes
10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Dec 2016, Vienna, Austria. pp.127-141, ⟨10.1007/978-3-319-49944-4_10⟩
Conference papers hal-01630544v1
Image document

ContextBased MicroTraining: A Framework for Information Security Training

Joakim Kävrestad , Marcus Nohlberg
14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.71-81, ⟨10.1007/978-3-030-57404-8_6⟩
Conference papers hal-03657726v1
Image document

Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula

Lynn Futcher , Johan Van Niekerk
8th World Conference on Information Security Education (WISE), Jun 2011, Lucerne, Switzerland. pp.164-171, ⟨10.1007/978-3-642-39377-8_18⟩
Conference papers hal-01463616v1
Image document

An Enterprise Anti-phishing Framework

Edwin Donald Frauenstein , Rossouw Von Solms
8th World Conference on Information Security Education (WISE), Jun 2011, Lucerne, Switzerland. pp.196-203, ⟨10.1007/978-3-642-39377-8_22⟩
Conference papers hal-01463630v1
Image document

Social Groupings and Information Security Obedience Within Organizations

Teodor Sommestad
30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.325-338, ⟨10.1007/978-3-319-18467-8_22⟩
Conference papers hal-01345118v1
Image document

Challenges for Knowledge Management in the Context of IT Global Sourcing Models Implementation

Kazimierz Perechuda , Małgorzata Sobińska
2nd IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KM), Sep 2014, Warsaw, Poland. pp.58-74, ⟨10.1007/978-3-319-28868-0_4⟩
Conference papers hal-01369801v1
Image document

Introducing Mobile Network Security Experiments to Communication Technology Education

Stig F. Mjølsnes , Ruxandra F. Olimid
10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.74-83, ⟨10.1007/978-3-319-58553-6_7⟩
Conference papers hal-01690971v1
Image document

Demographic Factors in Cyber Security: An Empirical Study

Shweta Mittal , P. Vigneswara Ilavarasan
18th Conference on e-Business, e-Services and e-Society (I3E), Sep 2019, Trondheim, Norway. pp.667-676, ⟨10.1007/978-3-030-29374-1_54⟩
Conference papers hal-02510112v1
Image document

Two Approaches to Information Security Doctoral Research

Helen Armstrong
8th World Conference on Information Security Education (WISE), Jun 2011, Lucerne, Switzerland. pp.172-179, ⟨10.1007/978-3-642-39377-8_19⟩
Conference papers hal-01463619v1
Image document

Aggregating Corporate Information Security Maturity Levels of Different Assets

Michael Schmid , Sebastian Pape
14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.376-392, ⟨10.1007/978-3-030-42504-3_24⟩
Conference papers hal-03378962v1
Image document

A Structured Comparison of the Corporate Information Security Maturity Level

Michael Schmid , Sebastian Pape
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.223-237, ⟨10.1007/978-3-030-22312-0_16⟩
Conference papers hal-03744289v1
Image document

Evaluating the Cisco Networking Academy Program's Instructional Model against Bloom's Taxonomy for the purpose of Information Security Education for Organizational End-users

J. F. Van Niekerk , K. Thomson
IFIP TC 3 International Conference on Key Competencies in the Knowledge Society (KCKS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.412-423, ⟨10.1007/978-3-642-15378-5_40⟩
Conference papers hal-01054721v1
Image document

Forming the Abilities of Designing Information Security Maintenance Systems in the Implementation of Educational Programmes in Information Security

Vladimir Budzko , Natalia Miloslavskaya , Alexander Tolstoy
11th IFIP World Conference on Information Security Education (WISE), Sep 2018, Poznan, Poland. pp.108-120, ⟨10.1007/978-3-319-99734-6_9⟩
Conference papers hal-02125764v1
Image document

Business Continuity and Information Security Maintenance" Masters’ Training Program

Natalia Miloslavskaya , Mikhail Senatorov , Alexandr Tolstoy , Sergei Zapechnikov
8th World Conference on Information Security Education (WISE), Jul 2013, Auckland, New Zealand. pp.95-102, ⟨10.1007/978-3-642-39377-8_10⟩
Conference papers hal-01463592v1
Image document

Tensions that Hinder the Implementation of Digital Security Governance

Stef Schinagl , Svetlana Khapova , Abbas Shahim
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.430-445, ⟨10.1007/978-3-030-78120-0_28⟩
Conference papers hal-03746037v1
Image document

Information Security and Open Source Dual Use Security Software: Trust Paradox

Mario Silic , Andrea Back
9th Open Source Software (OSS), Jun 2013, Koper-Capodistria, Slovenia. pp.194-206, ⟨10.1007/978-3-642-38928-3_14⟩
Conference papers hal-01467570v1
Image document

Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework

D. P. Snyman , H. A. Kruger
14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.133-143, ⟨10.1007/978-3-030-57404-8_11⟩
Conference papers hal-03657715v1
Image document

ISO/IEC Competence Requirements for Information Security Professionals

Natalia Miloslavskaya , Alexander Tolstoy
10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.135-146, ⟨10.1007/978-3-319-58553-6_12⟩
Conference papers hal-01690957v1
Image document

Using Actor Network Theory to Understand Information Security Management

Karin Hedström , Gurpreet Dhillon , Fredrik Karlsson
25th IFIP TC 11 International Information Security Conference (SEC) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.43-54, ⟨10.1007/978-3-642-15257-3_5⟩
Conference papers hal-01054504v1
Image document

A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance

Teodor Sommestad , Jonas Hallberg
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.257-271, ⟨10.1007/978-3-642-39218-4_20⟩
Conference papers hal-01463832v1
Image document

Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory

Yotamu Gangire , Adéle Da Veiga , Marlien Herselman
14th International Symposium on Human Aspects of Information Security and Assurance (HAISA), Jul 2020, Mytilene, Lesbos, Greece. pp.144-157, ⟨10.1007/978-3-030-57404-8_12⟩
Conference papers hal-03657707v1
Image document

Lessons Learned from an Organizational Information Security Awareness Campaign

Juan-Marc Scrimgeour , Jacques Ophoff
12th IFIP World Conference on Information Security Education (WISE), Jun 2019, Lisbon, Portugal. pp.129-142, ⟨10.1007/978-3-030-23451-5_10⟩
Conference papers hal-02365728v1
Image document

Security Levels for Web Authentication Using Mobile Phones

Anna Vapen , Nahid Shahmehri
6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.130-143, ⟨10.1007/978-3-642-20769-3_11⟩
Conference papers hal-01559465v1
Image document

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network

Irina Krivtsova , Ilya Lebedev , Mikhail Sukhoparov , Nurzhan Bazhayev , Igor Zikratov , et al.
14th International Conference on Wired/Wireless Internet Communication (WWIC), May 2016, Thessaloniki, Greece. pp.297-308, ⟨10.1007/978-3-319-33936-8_23⟩
Conference papers hal-01434859v1
Image document

HyperSec: Visual Analytics for Blockchain Security Monitoring

Benedikt Putz , Fabian Böhm , Günther Pernul
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2021, Oslo, Norway. pp.165-180, ⟨10.1007/978-3-030-78120-0_11⟩
Conference papers hal-03746036v1
Image document

Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values

Lena Connolly , Michael Lang , Doug Tygar
29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.417-430, ⟨10.1007/978-3-642-55415-5_35⟩
Conference papers hal-01370389v1
Image document

Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model

Ali Farooq , Debora Jeske , Jouni Isoaho
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.238-252, ⟨10.1007/978-3-030-22312-0_17⟩
Conference papers hal-03744297v1
Image document

Andragogy as a Scientific Basis for Training Professionals in Information Security

Alexander Tolstoy , Natalia Miloslavskaya
12th IFIP World Conference on Information Security Education (WISE), Jun 2019, Lisbon, Portugal. pp.72-85, ⟨10.1007/978-3-030-23451-5_6⟩
Conference papers hal-02365727v1
Image document

An Approach to Information Security Policy Modeling for Enterprise Networks

Dmitry Chernyavskiy , Natalia Miloslavskaya
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.118-127, ⟨10.1007/978-3-662-44885-4_10⟩
Conference papers hal-01404201v1