Human Aspects of Information Security and Assurance

Human Aspects of Information Security and Assurance

18th IFIP WG 11.12 International Symposium, HAISA 2024, Skoevde, Sweden, July 9-11, 2024, Proceedings, Part I

Furnell, Steve; Clarke, Nathan

Springer International Publishing AG

11/2024

368

Dura

9783031725586

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Management & Risk.



.- Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality.



.- Information security behavioural threshold analysis: An application in the South African retail sector.



.- Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists.



.- A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats.



.- Investigating the Factors Influencing Individuals' Self-Sovereign Identity Adoption Intentions.



.- "There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the Digital Age.



.- A Profile-Based Cyber Security Readiness Assessment Framework at Country Level.



.- To risk analyse, or not to risk analyse: That's the question.



.- Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review.



.- Information Security Management in Digitized Identity Systems The Case of the Ghanaian National Identification Authority (NIA).



.- Assessing Cyber Security Support for Small and Medium-Sized Enterprises.



.- Social Engineering.



.- A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks.



.- Defining Measures of Effect for Disinformation Attacks.



.- Phish and Tips:Phishing Awareness and Education for Older Adults.



.- Literature Review: Misconceptions about Phishing.



.- Technical Attacks & Defenses.



.- Linux Kernel Keyloggers and Information Security.



.- The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry.



.- An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack.



.- Research Agenda for Speaker Authentication.



.- Usable Security.



.- A Unified Privacy and Permission Management Framework.



.- Understanding users' mental models of Federated Identity Management (FIM): use of a new tangible elicitation method.



.- Multi-factor authentication adoption: A comparison between digital natives and digital immigrants in Sweden.



.- Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations.



.- Assessing the Cybersecurity Needs and Experiences of Disabled Users.
computer ethics and security;information security culture;awareness and education methods;enhancing risk perception;usable security;psychological models of security software usage;user acceptance of security policies and technologies;frictionless authentication methods;biometric technologies and impacts;automating security functionality;non-intrusive security;assisting security administration;impacts of standards, policies, compliance requirements;organizational governance for information assurance;risk and threat assessment;understanding motivations for misuse;social engineering;privacy attitudes and practices