default search action
10. HAISA 2016: Frankfurt, Germany
- Nathan L. Clarke, Steven Furnell:
Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. University of Plymouth 2016, ISBN 978-1-84102-413-4 - Jurjen Jansen, Paul van Schaik:
Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models. 1-11 - Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac:
Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. 12-21 - Dirk Snyman, Hennie A. Kruger:
Behavioural Thresholds in the Context of Information Security. 22-32 - Lena Yuryna Connolly, Michael Lang, John Gathegi, J. Doug Tygar:
The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study. 33-44 - Gunnar Wahlgren, Anna Fedotova, Alexandra Musaeva, Stewart Kowalski:
IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study. 45-55 - Argyri Pattakou, Christos Kalloniatis, Stefanos Gritzalis:
Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model. 56-66 - Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer:
Supporting Decision Makers in Choosing Suitable Authentication Schemes. 67-77 - Julian Dax, Benedikt Ley, Sebastian Pape, Christopher Schmitz, Volkmar Pipek, Kai Rannenberg:
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions. 78-87 - Bahareh Shojaie, Hannes Federrath, Iman Saberi:
Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture. 88-100 - Vivek Agrawal:
Towards the Ontology of ISO/IEC 27005: 2011 Risk Management Standard. 101-111 - Reza Alavi, Shareeful Islam:
Agile Changes of Security Landscape: A Human Factors and Security Investment View. 112-124 - Esra Alkhamis, Karen Renaud:
The Design and Evaluation of an Interactive Social Engineering Training Programme. 125-134 - Nora Alkaldi, Karen Renaud:
Why do People Adopt or Reject Smartphone Security Tools? 135-144 - Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:
Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea. 145-155 - Andreas Gutmann, Melanie Volkamer, Karen Renaud:
Memorable and Secure: How Do You Choose Your PIN?. 156-166 - Damian Todd Fredericks, Lynn Ann Futcher, Kerry-Lynn Thomson:
Comparing Student Password Knowledge and Behaviour: A Case Study. 167-178 - Lindokuhle Gcina Gomana, Lynn Ann Futcher, Kerry-Lynn Thomson:
An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula. 179-188 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram:
The Information Security Awareness of Bank Employees. 189-198 - Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp:
What Can Johnny Do?–Factors in an End-User Expertise Instrument. 199-208 - Moufida Sadok, Peter M. Bednar:
Information Security Management in SMEs: Beyond the IT Challenges. 209-219 - Alaa Sarah Alaqra, Simone Fischer-Hübner, John Sören Pettersson, Erik Wästlund:
Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario. 220-230 - Johan Van Niekerk, Kerry-Lynn Thomson:
Towards an Interdisciplinary Cyberbullying Campaign. 231-240 - Peter Schaab, Kristian Beckers, Sebastian Pape:
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology. 241-251 - Peter Leo Gorski, Luigi Lo Iacono:
Towards the Usability Evaluation of Security APIs. 252-265 - Francois Mouton, Kiru Pillay, Carien Van 't Wout:
The Technological Evolution of Psychological Operations Throughout History. 266-278 - Daryll Heneke, Jacques Ophoff, Adrie Stander:
The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective. 279-289 - Jan H. P. Eloff, Madeleine Adrienne Bihina Bella:
Near-Miss Analysis and the Availability of Software Systems. 290-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.