


default search action
10. HAISA 2016: Frankfurt, Germany
- Nathan L. Clarke, Steven Furnell:

Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. University of Plymouth 2016, ISBN 978-1-84102-413-4 - Jurjen Jansen, Paul van Schaik:

Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models. 1-11 - Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac:

Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. 12-21 - Dirk Snyman, Hennie A. Kruger:

Behavioural Thresholds in the Context of Information Security. 22-32 - Lena Yuryna Connolly, Michael Lang, John Gathegi, J. Doug Tygar:

The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study. 33-44 - Gunnar Wahlgren, Anna Fedotova, Alexandra Musaeva, Stewart Kowalski:

IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study. 45-55 - Argyri Pattakou, Christos Kalloniatis, Stefanos Gritzalis:

Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model. 56-66 - Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer:

Supporting Decision Makers in Choosing Suitable Authentication Schemes. 67-77 - Julian Dax, Benedikt Ley, Sebastian Pape

, Christopher Schmitz, Volkmar Pipek, Kai Rannenberg:
Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions. 78-87 - Bahareh Shojaie, Hannes Federrath, Iman Saberi:

Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture. 88-100 - Vivek Agrawal:

Towards the Ontology of ISO/IEC 27005: 2011 Risk Management Standard. 101-111 - Reza Alavi, Shareeful Islam:

Agile Changes of Security Landscape: A Human Factors and Security Investment View. 112-124 - Esra Alkhamis, Karen Renaud:

The Design and Evaluation of an Interactive Social Engineering Training Programme. 125-134 - Nora Alkaldi, Karen Renaud:

Why do People Adopt or Reject Smartphone Security Tools? 135-144 - Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt:

Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea. 145-155 - Andreas Gutmann, Melanie Volkamer, Karen Renaud:

Memorable and Secure: How Do You Choose Your PIN?. 156-166 - Damian Todd Fredericks, Lynn Ann Futcher, Kerry-Lynn Thomson:

Comparing Student Password Knowledge and Behaviour: A Case Study. 167-178 - Lindokuhle Gcina Gomana, Lynn Ann Futcher, Kerry-Lynn Thomson:

An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula. 179-188 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram:

The Information Security Awareness of Bank Employees. 189-198 - Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp:

What Can Johnny Do?–Factors in an End-User Expertise Instrument. 199-208 - Moufida Sadok, Peter M. Bednar:

Information Security Management in SMEs: Beyond the IT Challenges. 209-219 - Alaa Sarah Alaqra, Simone Fischer-Hübner, John Sören Pettersson, Erik Wästlund:

Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario. 220-230 - Johan Van Niekerk, Kerry-Lynn Thomson:

Towards an Interdisciplinary Cyberbullying Campaign. 231-240 - Peter Schaab, Kristian Beckers, Sebastian Pape

:
A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology. 241-251 - Peter Leo Gorski, Luigi Lo Iacono:

Towards the Usability Evaluation of Security APIs. 252-265 - Francois Mouton, Kiru Pillay, Carien Van 't Wout:

The Technological Evolution of Psychological Operations Throughout History. 266-278 - Daryll Heneke, Jacques Ophoff, Adrie Stander:

The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective. 279-289 - Jan H. P. Eloff, Madeleine Adrienne Bihina Bella:

Near-Miss Analysis and the Availability of Software Systems. 290-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














