![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
9. HAISA 2014: Plymouth, UK
- Nathan L. Clarke, Steven Furnell:
Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings. University of Plymouth 2014, ISBN 978-1-84102-375-5 - Moufida Sadok, Vasilios Katos, Peter M. Bednar:
Developing contextual understanding of information security risks. 1-10 - Tite Tuyikeze, Stephen Flowerday:
Information Security Policy Development and Implementation: A Content Analysis Approach. 11-20 - Shamal Faily:
Engaging Stakeholders in Security Design: An Assumption-Driven Approach. 21-29 - Kathryn Marie Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus Antanas Butavicius, Cate Jerram:
Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. 30-41 - André Lötter, Lynn Futcher:
A framework to assist email users in the identification of phishing attacks. 42-52 - Nalin Asanka Gamagedara Arachchilage, Andrew P. Martin:
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation. 53-68 - Thomas Hughes-Roberts:
Privacy as a Secondary Goal Problem: An Experiment Examining Control. 69-79 - Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos:
Reengineering the user: Privacy concerns about personal data on smartphones. 80-89 - Arne Renkema-Padmos, Jerome Baum, Melanie Volkamer, Karen Renaud:
Shake Hands to Bedevil: Securing Email with Wearable Technology. 90-100 - Karen Renaud, Rosanne English, Thomas Wynne, Florian Weber:
You Have Three Tries Before Lockout. Why Three?. 101-111 - Rosanne English:
Modelling the Security of Recognition-Based Graphical Passwords. 112-121 - Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Alternative Graphical Authentication for Online Banking Environments. 122-136 - Martin J. Butler, Rika Butler:
Improving internet banking security by using differentiated authentication based on risk profiling. 137-149 - Rika Butler, Martin J. Butler:
An assessment of the human factors affecting the password performance of South African online consumers. 150-161 - Bukelwa Ngoqo, Stephen Flowerday:
Linking student information security awareness and behavioural intent. 162-173 - Rayne Reid, Johan Van Niekerk:
Towards an Education Campaign for Fostering a Societal, Cyber Security Culture. 174-184 - Suné von Solms, Rossouw von Solms:
Towards Cyber Safety Education in Primary Schools in Africa. 185-197 - Nina Bär, Josef Krems:
Users can't be fooled - The role of existing vs. fictitious third party web assurance seals on websites. 198-205 - Yolanda Mjikeliso, Johan Van Niekerk, Kerry-Lynn Thomson:
Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network. 206-216 - Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter:
Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment. 217-229
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.