default search action
9. HAISA 2015: Lesvos, Greece
- Steven Furnell, Nathan L. Clarke:
Ninth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings. University of Plymouth 2015, ISBN 978-1-84102-388-5 - Noluxolo Gcaza, Rossouw von Solms, Joey Jansen van Vuuren:
An Ontology for a National Cyber-Security Culture Environment. 1-10 - Nico Martins, Adéle da Veiga:
An Information Security Culture Model Validated with Structural Equation Modelling. 11-21 - Adéle da Veiga:
The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case Study. 22-33 - Rayne Reid, Johan Van Niekerk:
A Cyber Security Culture Fostering Campaign through the Lens of Active Audience Theory. 34-44 - Abdullah Akmubark, Nobutoshi Hatanaka, Osamu Uchida, Yukiyo Ikeda:
Enlighten Information Morals through Corporate Culture. 45-56 - Malcolm R. Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram:
Examining Attitudes toward Information Security Behaviour using Mixed Methods. 57-70 - Fredrik Karlsson, Ella Kolkowska, Karin Hedström, Magnus Frostenson:
Inter-Organisational Information Sharing - Between a Rock and a Hard Place. 71-81 - Waldo Rocha Flores, Mathias Ekstedt:
Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness. 82-94 - Adéle da Veiga:
An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture. 95-107 - Kirsi Helkala, Silje Knox, Mass Soldal Lund:
Effect of Motivation and Physical Fitness on Cyber Tasks. 108-119 - Jurjen Jansen:
Studying Safe Online Banking Behaviour: A Protection Motivation Theory Approach. 120-130 - Miranda Kajtazi, Ella Kolkowska, Burcu Bulgurcu:
New Insights Into Understanding Manager's Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors. 131-140 - Hazel Webb, Nick Savage, Peter Millard:
Arguments For Anonymity. 141-150 - Moufida Sadok, Peter M. Bednar:
Understanding Security Practices Deficiencies: A Contextual Analysis. 151-160 - Reza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee:
Managing Social Engineering Attacks- Considering Human Factors and Security Investment. 161-171 - Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a Semiotic Model of Computer Security Circumvention. 172-182 - Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg:
Perceived Information Security Risk as a Function of Probability and Severity. 183-193 - Craig Thurlby, Caroline S. Langensiepen, John Haggerty, Robert Ranson:
Understanding User Knowledge of Computer Security and Risk: A Comparative Study. 194-203 - Timothy Kelley, Bennett I. Bertenthal:
Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do'. 204-214 - Naume Sonhera, Elmarie Kritzinger, Marianne Loock:
Cyber Threat Incident Handling Procedure for South African Schools. 215-232 - Shamal Faily, John McAlaney, Claudia Iacob:
Ethical Dilemmas and Dimensions in Penetration Testing. 233-242 - Liezel Cilliers, Stephen Flowerday:
The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City. 243-255 - Joakim Kävrestad, Marcus Nohlberg:
Online Fraud Defence by Context Based Micro Training. 256-264 - Patrik Lif, Teodor Sommestad:
Human factors related to the performance of intrusion detection operators. 265-275 - Neil McDonald, Shamal Faily, Marcella Favale, Christos Gatzidis:
Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers. 276-285
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.