Human Aspects of Information Security and Assurance
portes grátis
Human Aspects of Information Security and Assurance
15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings
Furnell, Steven; Clarke, Nathan
Springer Nature Switzerland AG
07/2022
223
Mole
Inglês
9783030811136
15 a 20 dias
367
Descrição não disponível.
Attitudes and Perspectives.- Cyber Security in Healthcare Organisations.- Cybersecurity and digital exclusion of seniors: what do they fear?.- Exploring experiences of using SETA in Nordic municipalities.- Cyber Security Education.- SherLOCKED: A Detective-themed Serious Game for Cyber Security Education.- A Reference Point for Designing a Cybersecurity Curriculum for Universities.- A Conceptual Information Security Culture Framework for Higher Learning Institutions.- What can we learn from the analysis of information security policies: the case of UK's schools.- A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity.- Evaluation strategies for cybersecurity training methods: a literature review.- People and Technology.- When Googling it doesn't work: The challenge of finding security advice for smart home devices.- Making Access Control Easy in IoT.- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation.- Friend or Foe: An investigation into recipient identification of SMS-based phishing.- Towards a Risk Assessment Matrix for Information Security Workarounds.- A Theoretical Underpinning for Examining Insider Attacks leveraging the Fraud Pentagon.- A Systematic Literature Review on Virtual Reality Authentication.- Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints.- The one-eyed leading the blind: Understanding differences between IT professionals and non-IT staff when creating and managing passwords.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;artificial intelligence;authentication protocols;computer crime;computer security;cryptography;cyber security;cyber threats;data security;hci;human-computer interaction;information assurance;information security;information systems;information technology;network protocols;network security
Attitudes and Perspectives.- Cyber Security in Healthcare Organisations.- Cybersecurity and digital exclusion of seniors: what do they fear?.- Exploring experiences of using SETA in Nordic municipalities.- Cyber Security Education.- SherLOCKED: A Detective-themed Serious Game for Cyber Security Education.- A Reference Point for Designing a Cybersecurity Curriculum for Universities.- A Conceptual Information Security Culture Framework for Higher Learning Institutions.- What can we learn from the analysis of information security policies: the case of UK's schools.- A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity.- Evaluation strategies for cybersecurity training methods: a literature review.- People and Technology.- When Googling it doesn't work: The challenge of finding security advice for smart home devices.- Making Access Control Easy in IoT.- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation.- Friend or Foe: An investigation into recipient identification of SMS-based phishing.- Towards a Risk Assessment Matrix for Information Security Workarounds.- A Theoretical Underpinning for Examining Insider Attacks leveraging the Fraud Pentagon.- A Systematic Literature Review on Virtual Reality Authentication.- Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints.- The one-eyed leading the blind: Understanding differences between IT professionals and non-IT staff when creating and managing passwords.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;artificial intelligence;authentication protocols;computer crime;computer security;cryptography;cyber security;cyber threats;data security;hci;human-computer interaction;information assurance;information security;information systems;information technology;network protocols;network security