![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
16th HAISA 2022: Mytilene, Lesbos, Greece
- Nathan L. Clarke
, Steven Furnell
:
Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings. IFIP Advances in Information and Communication Technology 658, Springer 2022, ISBN 978-3-031-12171-5
Cyber Security Education and Training
- Magdalena Glas
, Manfred Vielberth
, Tobias Reittinger
, Fabian Böhm
, Günther Pernul
:
Visual Programming in Cyber Range Training to Improve Skill Development. 3-13 - Joakim Kävrestad
, Martin Gellerstedt
, Marcus Nohlberg
, Jana Rambusch:
Survey of Users' Willingness to Adopt and Pay for Cybersecurity Training. 14-23 - Madri Kruger
, Lynn Futcher
, Kerry-Lynn Thomson
:
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa. 24-38 - Olivier de Casanove, Nicolas Leleu, Florence Sèdes:
Applying PDCA to Security, Education, Training and Awareness Programs. 39-48 - Ana I. González-Tablas
, Mohammed Rashed
:
Exploring CyBOK with Topic Modeling Techniques. 49-65 - Jerry Andriessen
, Steven Furnell
, Gregor Langner
, Carmela Luciano
, Gerald Quirchmayr
, Vittorio Scarano
, Teemu Johannes Tokola
:
COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education. 66-76 - Vuyolwethu Sizoli Mdunyelwa
, Lynn Futcher
, Johan Van Niekerk
:
An Investigation into Educational Process Models for Teaching Secure Programming. 77-90 - R. Thomani, Annlizé Marnewick, Suné von Solms, Masike Malatji
:
Cybersecurity Knowledge Requirements for a Water Sector Employee. 91-105 - Thaddeus Eze, Neil Hawker:
CAP: Patching the Human Vulnerability. 106-119 - Rudi Serfontein
, Riana Serfontein
:
A Novel Framework for the Development of Age Appropriate Information Security Serious Games. 120-129
Cyber Security Culture
- Stefanos Evripidou, Uchenna Daniel Ani, Jeremy D. McK. Watson, Stephen Hailes:
Security Culture in Industrial Control Systems Organisations: A Literature Review. 133-146 - Emilia N. Mwim, Jabu Mtsweni:
Systematic Review of Factors that Influence the Cybersecurity Culture. 147-172 - Victor Reppoh
, Adéle da Veiga
:
Cyber4Dev Security Culture Model for African Countries. 173-185 - Adéle da Veiga
:
A Model for Information Security Culture with Innovation and Creativity as Enablers. 186-196 - Rufai Ahmad
, Sotirios Terzis
:
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links. 197-206
Privacy
- Gunnar Lindqvist
, Joakim Kävrestad
:
How Privacy Concerns Impact Swedish Citizens' Willingness to Report Crimes. 209-217 - Anne Hennig
, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer
, Peter Mayer
:
"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?". 218-227 - Leah Shanley, Michael N. Johnstone
, Patryk Szewczyk
, Michael Crowley:
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results. 228-239 - Chola Chhetri
, Vivian Motti
:
Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart Home. 240-250
Cyber Security Management
- Keshnee Padayachee
:
An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective. 253-264 - Elham Rostami, Fredrik Karlsson, Shang Gao:
Policy Components - A Conceptual Model for Tailoring Information Security Policies. 265-274 - Anusha Bhana, Jacques Ophoff
:
Security Fatigue: A Case Study of Data Specialists. 275-284 - Karabo Pilane, Zainab Ruhwanya, Irwin Brown
:
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities. 285-299 - Najla Aldaraani
, Helen Petrie
, Siamak F. Shahandashti
:
Online Security Attack Experience and Worries of Young Adults in the United Kingdom. 300-309 - Enock Samuel Mbewe
, Taveesh Sharma, Josiah Chavula
:
PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator. 310-327
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.