index - Human Aspects of Information Security and Assurance
   


Full Text Documents

28

Search


Table of Contents
Human Aspects of Information Security and Assurance
Nathan Clarke, Steven Furnell
Front Matter

Privacy and COVID-19


Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?
Leah Shanley, Michael Johnstone, Michael Crowley, Patryk Szewczyk
3-15
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa
Adéle Veiga, Jacques Ophoff
16-29
A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone Applications
Georgios Magklaras, Lucia López-Bojórquez
30-44

Awareness and Training


Towards a Cross-Cultural Education Framework for Online Safety Awareness
R. Herkanaidu, S. Furnell, M. Papadaki
47-57
Towards an Heuristic Approach to Cybersecurity and Online Safety Pedagogy
Simon Marsden
58-70
ContextBased MicroTraining: A Framework for Information Security Training
Joakim Kävrestad, Marcus Nohlberg
71-81

Social Engineering


Employees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test
Mohammed Alotaibi
85-96
Does Ubuntu Influence Social Engineering Susceptibility?
Ntsewa Mokobane, Reinhardt Botha
97-108
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory
P. Unchit, S. Das, A. Kim, L. Camp
109-120

Security Behaviour


KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young Children
Esra Alkhamis, Helen Petrie, Karen Renaud
123-132
Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework
D. Snyman, H. Kruger
133-143
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory
Yotamu Gangire, Adéle Veiga, Marlien Herselman
144-157

Education


Addressing SME Characteristics for Designing Information Security Maturity Models
Bilge Yigit Ozkan, Marco Spruit
161-174
Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships
Ismini Vasileiou
175-185
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction
Dean Schoultz, Kerry-Lynn Thomson, Johan Niekerk
186-207

End-User Security


Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices
B. Momenzadeh, S. Gopavaram, S. Das, L. Camp
211-223
Exploring Information Security and Domestic Equality
Marcus Nohlberg, Joakim Kävrestad
224-232
Responding to KRACK: Wi-Fi Security Awareness in Private Households
Jan Freudenreich, Jake Weidman, Jens Grossklags
233-243

Usable Security


Exploring the Meaning of “Usable Security”
Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg
247-258
Dyslexia and Password Usage: Accessibility in Authentication Design
Karen Renaud, Graham Johnson, Jacques Ophoff
259-268
Securing User eXperience: A Review for the End-Users’ Software Robustness
Panagiotis Zagouras, Christos Kalloniatis
269-285

Security Policy


SMEs’ Confidentiality Concerns for Security Information Sharing
Alireza Shojaifar, Samuel Fricker
289-299
Validation of an Information Privacy Perception Instrument at a Zimbabwean University
Kudakwashe Maguraushe, Adéle Veiga, Nico Martins
300-314
Are We Really Informed on the Rights GDPR Guarantees?
Maria Sideri, Stefanos Gritzalis
315-326

Attitudes and Perceptions


“Most Companies Share Whatever They Can to Make Money!”: Comparing User’s Perceptions with the Data Practices of IoT Devices
Mahdi Al-Ameen, Apoorva Chauhan, M. Ahsan, Huzeyfe Kocabas
329-340
Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement
Joseph Williams, Paul Stephens
341-352
Critical Analysis of Information Security Culture Definitions
Zainab Ruhwanya, Jacques Ophoff
353-365

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/