callback( { "result":{ "query":":facetid:toc:\"db/conf/haisa/haisa2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.98" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"26", "@dc":"26", "@oc":"26", "@id":"43384328", "text":":facetid:toc:db/conf/haisa/haisa2017.bht" } }, "hits":{ "@total":"26", "@computed":"26", "@sent":"26", "@first":"0", "hit":[{ "@score":"1", "@id":"2924869", "info":{"authors":{"author":[{"@pid":"211/0611","text":"Manal Alohali"},{"@pid":"77/1987","text":"Nathan L. Clarke"},{"@pid":"28/10652-1","text":"Fudong Li 0001"},{"@pid":"83/2392","text":"Steven Furnell"}]},"title":"Identifying the Factors Affecting End-Users’ Risk-Taking Behavior.","venue":"HAISA","pages":"126-144","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/AlohaliCLF17","ee":"http://www.cscan.org/openaccess/?paperid=366","url":"https://dblp.org/rec/conf/haisa/AlohaliCLF17"}, "url":"URL#2924869" }, { "@score":"1", "@id":"2924870", "info":{"authors":{"author":{"@pid":"42/2865","text":"Debi Ashenden"}},"title":"What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research.","venue":"HAISA","pages":"251-260","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/Ashenden17","ee":"http://www.cscan.org/openaccess/?paperid=370","url":"https://dblp.org/rec/conf/haisa/Ashenden17"}, "url":"URL#2924870" }, { "@score":"1", "@id":"2924871", "info":{"authors":{"author":[{"@pid":"37/2564","text":"Marcus A. Butavicius"},{"@pid":"26/10652","text":"Kathryn Parsons"},{"@pid":"84/11061","text":"Malcolm R. Pattinson"},{"@pid":"75/10651","text":"Agata McCormac"},{"@pid":"165/6917","text":"Dragana Calic"},{"@pid":"211/0536","text":"Meredith Lillie"}]},"title":"Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture.","venue":"HAISA","pages":"12-23","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/ButaviciusPPMCL17","ee":"http://www.cscan.org/openaccess/?paperid=354","url":"https://dblp.org/rec/conf/haisa/ButaviciusPPMCL17"}, "url":"URL#2924871" }, { "@score":"1", "@id":"2924872", "info":{"authors":{"author":[{"@pid":"64/3207","text":"Chris Culnane"},{"@pid":"t/VanessaTeague","text":"Vanessa Teague"}]},"title":"Why Open Government is good for cybersecurity and public trust - now would be a good time to start.","venue":"HAISA","pages":"236-250","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/CulnaneT17","ee":"http://www.cscan.org/openaccess/?paperid=367","url":"https://dblp.org/rec/conf/haisa/CulnaneT17"}, "url":"URL#2924872" }, { "@score":"1", "@id":"2924873", "info":{"authors":{"author":[{"@pid":"65/7191","text":"Val A. Hooper"},{"@pid":"118/8800","text":"Jacques Ophoff"}]},"title":"The Influence of Organizational Commitment on Information Security Policy Compliance.","venue":"HAISA","pages":"114-125","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/HooperO17","ee":"http://www.cscan.org/openaccess/?paperid=372","url":"https://dblp.org/rec/conf/haisa/HooperO17"}, "url":"URL#2924873" }, { "@score":"1", "@id":"2924874", "info":{"authors":{"author":[{"@pid":"94/3826","text":"Michael James"},{"@pid":"19/10027","text":"Patryk Szewczyk"}]},"title":"Jurisdictional Issues in Cloud Forensics.","venue":"HAISA","pages":"225-235","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/JamesS17","ee":"http://www.cscan.org/openaccess/?paperid=362","url":"https://dblp.org/rec/conf/haisa/JamesS17"}, "url":"URL#2924874" }, { "@score":"1", "@id":"2924875", "info":{"authors":{"author":[{"@pid":"42/7260","text":"Jurjen Jansen"},{"@pid":"73/1124","text":"Paul van Schaik"}]},"title":"Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing.","venue":"HAISA","pages":"1-11","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/JansenS17","ee":"http://www.cscan.org/openaccess/?paperid=352","url":"https://dblp.org/rec/conf/haisa/JansenS17"}, "url":"URL#2924875" }, { "@score":"1", "@id":"2924876", "info":{"authors":{"author":[{"@pid":"75/10651","text":"Agata McCormac"},{"@pid":"165/6917","text":"Dragana Calic"},{"@pid":"37/2564","text":"Marcus A. Butavicius"},{"@pid":"26/10652","text":"Kathryn Parsons"},{"@pid":"84/11061","text":"Malcolm R. Pattinson"},{"@pid":"211/0536","text":"Meredith Lillie"}]},"title":"Understanding the Relationships between Resilience, Work Stress and Information Security Awareness.","venue":"HAISA","pages":"80-90","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/McCormacCBPPL17","ee":"http://www.cscan.org/openaccess/?paperid=365","url":"https://dblp.org/rec/conf/haisa/McCormacCBPPL17"}, "url":"URL#2924876" }, { "@score":"1", "@id":"2924877", "info":{"authors":{"author":[{"@pid":"211/0747","text":"Vuyolwethu Sizoli Mdunyelwa"},{"@pid":"211/0485","text":"Johannes Frederick Van Niekerk"},{"@pid":"45/6919","text":"Lynn Ann Futcher"}]},"title":"Secure Coding Practices in the Software Development Capstone Projects.","venue":"HAISA","pages":"282-291","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/MdunyelwaNF17","ee":"http://www.cscan.org/openaccess/?paperid=353","url":"https://dblp.org/rec/conf/haisa/MdunyelwaNF17"}, "url":"URL#2924877" }, { "@score":"1", "@id":"2924878", "info":{"authors":{"author":[{"@pid":"211/0587","text":"Johan van de Merwe"},{"@pid":"39/10872","text":"Francois Mouton"}]},"title":"Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle.","venue":"HAISA","pages":"24-40","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/MerweM17","ee":"http://www.cscan.org/openaccess/?paperid=371","url":"https://dblp.org/rec/conf/haisa/MerweM17"}, "url":"URL#2924878" }, { "@score":"1", "@id":"2924879", "info":{"authors":{"author":[{"@pid":"130/8112","text":"Nicholas Micallef"},{"@pid":"124/8007","text":"Nalin Asanka Gamagedara Arachchilage"}]},"title":"Involving Users in the Design of a Serious Game for Security Questions Education.","venue":"HAISA","pages":"177-187","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/MicallefA17","ee":"http://www.cscan.org/openaccess/?paperid=348","url":"https://dblp.org/rec/conf/haisa/MicallefA17"}, "url":"URL#2924879" }, { "@score":"1", "@id":"2924880", "info":{"authors":{"author":[{"@pid":"118/5293","text":"Gaurav Misra"},{"@pid":"124/8007","text":"Nalin Asanka Gamagedara Arachchilage"},{"@pid":"35/5995","text":"Shlomo Berkovsky"}]},"title":"Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks.","venue":"HAISA","pages":"41-51","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/MisraAB17","ee":"http://www.cscan.org/openaccess/?paperid=349","url":"https://dblp.org/rec/conf/haisa/MisraAB17"}, "url":"URL#2924880" }, { "@score":"1", "@id":"2924881", "info":{"authors":{"author":[{"@pid":"211/0588","text":"Henry Oladimeji"},{"@pid":"118/8800","text":"Jacques Ophoff"}]},"title":"Factors Influencing the Use of Privacy Settings in Location-Based Social Networks.","venue":"HAISA","pages":"215-224","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/OladimejiO17","ee":"http://www.cscan.org/openaccess/?paperid=364","url":"https://dblp.org/rec/conf/haisa/OladimejiO17"}, "url":"URL#2924881" }, { "@score":"1", "@id":"2924882", "info":{"authors":{"author":[{"@pid":"211/0502","text":"Joseph Omidosu"},{"@pid":"118/8800","text":"Jacques Ophoff"}]},"title":"Employee Information Security Beliefs in the Home Environment.","venue":"HAISA","pages":"167-176","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/OmidosuO17","ee":"http://www.cscan.org/openaccess/?paperid=358","url":"https://dblp.org/rec/conf/haisa/OmidosuO17"}, "url":"URL#2924882" }, { "@score":"1", "@id":"2924883", "info":{"authors":{"author":[{"@pid":"142/8085","text":"Ali Mohammad Padyab"},{"@pid":"15/545","text":"Anna Ståhlbröst"}]},"title":"Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation.","venue":"HAISA","pages":"202-214","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/PadyabS17","ee":"http://www.cscan.org/openaccess/?paperid=361","url":"https://dblp.org/rec/conf/haisa/PadyabS17"}, "url":"URL#2924883" }, { "@score":"1", "@id":"2924884", "info":{"authors":{"author":[{"@pid":"211/0548","text":"Asanka I Pathirana"},{"@pid":"47/4477","text":"Patricia A. H. Williams"}]},"title":"The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs).","venue":"HAISA","pages":"292-302","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/PathiranaW17","ee":"http://www.cscan.org/openaccess/?paperid=359","url":"https://dblp.org/rec/conf/haisa/PathiranaW17"}, "url":"URL#2924884" }, { "@score":"1", "@id":"2924885", "info":{"authors":{"author":[{"@pid":"167/9807","text":"Andrew Reeves"},{"@pid":"26/10652","text":"Kathryn Parsons"},{"@pid":"165/6917","text":"Dragana Calic"}]},"title":"Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness.","venue":"HAISA","pages":"145-155","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/ReevesPC17","ee":"http://www.cscan.org/openaccess/?paperid=369","url":"https://dblp.org/rec/conf/haisa/ReevesPC17"}, "url":"URL#2924885" }, { "@score":"1", "@id":"2924886", "info":{"authors":{"author":[{"@pid":"22/3696","text":"Abdulhadi Shoufan"},{"@pid":"d/EDamiani","text":"Ernesto Damiani"}]},"title":"How Reliable are Experts’ Assessments? A Case Study on UAV Security.","venue":"HAISA","pages":"104-113","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/ShoufanD17","ee":"http://www.cscan.org/openaccess/?paperid=368","url":"https://dblp.org/rec/conf/haisa/ShoufanD17"}, "url":"URL#2924886" }, { "@score":"1", "@id":"2924887", "info":{"authors":{"author":[{"@pid":"181/7331","text":"Dirk Snyman"},{"@pid":"09/6595","text":"Hennie A. Kruger"},{"@pid":"77/4570","text":"Wayne D. Kearney"}]},"title":"The Lemming Effect in Information Security.","venue":"HAISA","pages":"91-103","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/SnymanKK17","ee":"http://www.cscan.org/openaccess/?paperid=356","url":"https://dblp.org/rec/conf/haisa/SnymanKK17"}, "url":"URL#2924887" }, { "@score":"1", "@id":"2924888", "info":{"authors":{"author":{"@pid":"74/8033","text":"Suné von Solms"}},"title":"Digital Wellness: Concepts of cybersecurity presented visually for children.","venue":"HAISA","pages":"156-166","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/Solms17","ee":"http://www.cscan.org/openaccess/?paperid=350","url":"https://dblp.org/rec/conf/haisa/Solms17"}, "url":"URL#2924888" }, { "@score":"1", "@id":"2924889", "info":{"authors":{"author":[{"@pid":"74/8033","text":"Suné von Solms"},{"@pid":"45/6919","text":"Lynn Futcher"}]},"title":"Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies.","venue":"HAISA","pages":"261-271","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/SolmsF17","ee":"http://www.cscan.org/openaccess/?paperid=351","url":"https://dblp.org/rec/conf/haisa/SolmsF17"}, "url":"URL#2924889" }, { "@score":"1", "@id":"2924890", "info":{"authors":{"author":[{"@pid":"19/10027","text":"Patryk Szewczyk"},{"@pid":"211/0514","text":"Dan Blackman"},{"@pid":"175/6290","text":"Krishnun Sansurooah"}]},"title":"An Analysis of Unauthorized Wireless Network Usage in Western Australia.","venue":"HAISA","pages":"272-281","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/SzewczykBS17","ee":"http://www.cscan.org/openaccess/?paperid=360","url":"https://dblp.org/rec/conf/haisa/SzewczykBS17"}, "url":"URL#2924890" }, { "@score":"1", "@id":"2924891", "info":{"authors":{"author":[{"@pid":"211/0463","text":"Alaa Tolah"},{"@pid":"83/2392","text":"Steven Furnell"},{"@pid":"69/1571","text":"Maria Papadaki"}]},"title":"A comperhansive framework for cultivating and assessing Information Security Culture .","venue":"HAISA","pages":"52-64","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/TolahFP17","ee":"http://www.cscan.org/openaccess/?paperid=357","url":"https://dblp.org/rec/conf/haisa/TolahFP17"}, "url":"URL#2924891" }, { "@score":"1", "@id":"2924892", "info":{"authors":{"author":{"@pid":"159/9699","text":"Adéle da Veiga"}},"title":"The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions.","venue":"HAISA","pages":"65-79","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/Veiga17","ee":"http://www.cscan.org/openaccess/?paperid=355","url":"https://dblp.org/rec/conf/haisa/Veiga17"}, "url":"URL#2924892" }, { "@score":"1", "@id":"2924893", "info":{"authors":{"author":{"@pid":"159/9699","text":"Adéle da Veiga"}},"title":"An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study.","venue":"HAISA","pages":"188-201","year":"2017","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/haisa/Veiga17a","ee":"http://www.cscan.org/openaccess/?paperid=363","url":"https://dblp.org/rec/conf/haisa/Veiga17a"}, "url":"URL#2924893" }, { "@score":"1", "@id":"3034910", "info":{"authors":{"author":[{"@pid":"83/2392","text":"Steven Furnell"},{"@pid":"77/1987","text":"Nathan L. Clarke"}]},"title":"Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings.","venue":"HAISA","publisher":"University of Plymouth","year":"2017","type":"Editorship","access":"unavailable","key":"conf/haisa/2017","url":"https://dblp.org/rec/conf/haisa/2017"}, "url":"URL#3034910" } ] } } } )