index - Human Aspects of Information Security and Assurance Access content directly

Table of Contents
Human Aspects of Information Security and Assurance
Steven Furnell, Nathan Clarke
Front Matter

Attitudes and Perspectives


Cyber Security in Healthcare Organisations
Dhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver
3-11
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?
Jesper Holgersson, Joakim Kävrestad, Marcus Nohlberg
12-21
Exploring Experiences of Using SETA in Nordic Municipalities
Aous Al Salek, Joakim Kävrestad, Marcus Nohlberg
22-31

Cyber Security Education


SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education
Alice Jaffray, Conor Finn, Jason Nurse
35-45
A Reference Point for Designing a Cybersecurity Curriculum for Universities
Adéle Da Veiga, Elisha Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Peeha Machaka
46-62
A Conceptual Information Security Culture Framework for Higher Learning Institutions
Charles Mawutor Ocloo, Adéle Da Veiga, Jan Kroeze
63-80
What Can We Learn from the Analysis of Information Security Policies? The Case of UK’s Schools
Martin Sparrius, Moufida Sadok, Peter Bednar
81-90
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children
D. P. Snyman, Günther R. Drevin, Hennie A. Kruger, Lynette Drevin, Johann Allers
91-101
Evaluation Strategies for Cybersecurity Training Methods: A Literature Review
Joakim Kävrestad, Marcus Nohlberg
102-112

People and Technology


When Googling It Doesn’t Work: The Challenge of Finding Security Advice for Smart Home Devices
Sarah Turner, Jason Nurse, Shujun Li
115-126
Making Access Control Easy in IoT
Vafa Andalibi, Jayati Dev, Donginn Kim, Eliot Lear, L. Jean Camp
127-137
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation
Daniel Hulatt, Eliana Stavrou
138-147
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing
Max Clasen, Fudong Li, David Williams
148-163
Towards a Risk Assessment Matrix for Information Security Workarounds
Eugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher
164-178
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon
Keshnee Padayachee
179-188
A Literature Review on Virtual Reality Authentication
John M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das
189-198
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints
Lee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray
199-210
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords
Paul Brockbanks, Martin J. Butler
211-222

 




Full Text Documents

18

Search

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/