default search action
13th HAISA 2019: Nicosia, Cyprus
- Steven Furnell, Nathan L. Clarke:
Thirteenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2019, Nicosia, Cyprus, July 15-16, 2019, Proceedings. University of Plymouth 2019, ISBN 978-0244-19096-5 - Elham Rostami:
Tailoring Policies and Involving Users in Constructing Security Policies - A Mapping Study. 1-11 - Omar Olivos:
Using the IKEA Effect to Improve Information Security Policy Compliance . 12-19 - Fayez Alotaibi, Nathan Luke Clarke, Steven Furnell:
Holistic Information Security Management for Home Environments. 20-33 - Anotnia Michael, Jan H. P. Eloff:
A Machine Learning Approach to Detect Insider Threats in Emails Caused by Human Behaviours. 34-49 - Georgina Humphries, Joseph Williams:
Public Understanding of Cyber Security and Digital Forensics within the UK. 50-60 - Olga Angelopoulou, Seyedali Pourmoafi, Andrew Jones, Gaurav Sharma:
Killing Your Device via Your USB Port. 61-72 - Aziz Alshehri, Nathan Luke Clarke, Fudong Li:
Privacy Enhancing Technology Awareness for Mobile Devices . 73-88 - Georgina Humphries:
Public Thoughts on Tackling Digital Crime in Society and by Law Enforcement. 89-98 - Mohamed Sarrab, Fatma Alshohoumi:
Critical Aspects Pertaining to Privacy Preservation of IoT Architecture. 99-109 - Håkon Gunleifsen, Vasileios Gkioulos, Gaute Wangen, Andrii Shalaginov, Mazaher Kianpour, Mohamed Abomhara:
Cybersecurity Awareness and Culture in Rural Norway. 110-121 - Joakim Kävrestad, Marie Skärgård, Marcus Nohlberg:
Users perception of using CBMT for information security training. 122-131 - Malcolm R. Pattinson, Jane Sweeney, Marcus A. Butavicius, Andrew Reeves, Kathryn Parsons, Agata McCormac, Dragana Calic:
Aligning Cyber-Security Training to Individual Cognitive Style. 132-142 - Sanchari Das, Bingxi Wang, Linda Jean Camp:
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content. 143-154 - Joakim Kävrestad, Johan Zaxmy, Marcus Nohlberg:
Analysing the Usage of Character Groups and Keyboard Patterns in Password. 155-165 - Sanchari Das, Bingxi Wang, Zachary Tingle, Linda Jean Camp:
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. 166-178 - Vivian Ives Philipp Erbenich, Daniel Träder, Andreas Heinemann, Meltem Nural:
Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation. 179-188 - Sanchari Das, Andrew Kim, Zachary Tingle, Christena Nippert-Eng:
All About Phishing: Exploring User Research through a Systematic Literature Review. 189-202 - Mohammed Khaled N. Alotaibi:
A Hypothesised Model to Examine Susceptibility to Cyber-Social Engineering Through LinkedIn in The Workplace. 203-214
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.