Human Aspects of Information Security and Assurance: 14th Ifip Wg 11.12 International Symposium, Haisa 2020, Mytilene, Lesbos, Greece, July 8-10, 2020 » książka
Privacy and COVID-19.- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?.- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa.- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications.- Awareness and Training.- Towards a Cross-Cultural Education Framework for Online Safety Awareness.- A heuristic point of view of cybersecurity and online safety pedagogy.- Context Based Micro Training: A Framework for Information Security Training.- Social Engineering.- Employees’ Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test.- Does ubuntu influence social engineering susceptibility?.- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.- Security Behaviour.- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children.- Information security behavioural threshold analysis in practice: An implementation framework.- Information security behaviour: Development of a measurement instrument based on the self-determination theory.- Education.- Addressing SME Characteristics for Designing Information Security Maturity Models.- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships.- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction.- End-User Security.- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.- Exploring Information Security and Domestic Equality.- Responding to KRACK: Wi-Fi Security Awareness in Private Households.- Usable Security.- Exploring the meaning of "usable security".- Dyslexia and Password Usage: Accessibility in Authentication Design.- Securing User eXperience (SUX): A Review For the End-Users’ Software Robustness.- Security Policy.- SMEs’ Confidentiality Concerns for Security Information Sharing.- Validation of an information privacy perception instrument at a Zimbabwean university.- Are We Really Informed on the Rights GDPR Guarantees?.- Attitudes and Perceptions.- “Most Companies Share Whatever They Can to Make Money!”: Comparing User's Perceptions with the Data Practices of IoT Devices.- Analysis of the ‘Open Source Internet Research Tool’: A Usage Perspective from UK Law Enforcement.- Critical analysis of Information Security Culture Definitions.