Human Aspects of Information Security and Assurance

Human Aspects of Information Security and Assurance

16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings

Furnell, Steven; Clarke, Nathan

Springer International Publishing AG

07/2022

329

Dura

Inglês

9783031121715

15 a 20 dias

682

Descrição não disponível.
Cyber Security Education & Training.- Visual Programming in Cyber Range Training to Improve Skill Development.- Survey of users' willingness to adopt and pay for cybersecurity training.- A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa.- Applying PDCA to Security, Education, Training and Awareness Programs.- Exploring CyBOK with Topic Modeling Techniques.- COLTRANE - Towards a methodology and platform supported educational basis for cybersecurity education.- An investigation into educational process models for teaching secure programming.- Cybersecurity Knowledge Requirements for a Water Sector Employee.- CAP: Patching the Human Vulnerability.- A novel framework for the development of age appropriate information security serious games.- Cyber Security Culture.- Security Culture in Industrial Control Systems Organisations: A literature review.- Systematic review of factors that influence the cybersecurity culture.- Cyber4Dev Security Culture Model for African Countries.- A model for information security culture with innovation and creativity as enablers.- Understanding phishing in mobile instant messaging: A study into user behaviour toward shared links.- Privacy.- How privacy concerns impact Swedish citizens' willingness to report crimes.- Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why.- A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results.- Designing and Evaluating a Prototype for Data-related Privacy Controls in a Smart Home.- Cyber Security Management.- An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective.- Policy components - a conceptual model for tailoring information security policies.- Security fatigue: A case study of data specialists.- Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities.- Online security attack experience and worries of young adults in the United Kingdom.- PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator.
Assisting security administration;Automating security functionality;awareness and education methods;Computer ethics and security;computer networks;cryptography;cyber security;data security;enhancing risk perception;Impacts of standards, policies, compliance requirements;information security culture;network protocols;network security;Non-intrusive security;Organizational governance for information assurance;Privacy attitudes and practices;Risk and threat assessment;Social engineering;Understanding motivations for misuse;usable security