default search action
STAST 2014: Vienna, Austria
- Giampaolo Bella, Gabriele Lenzini:
2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7901-1
Security Ceremonies and Policies
- Debora Jeske, Lynne M. Coventry, Pamela Briggs:
Decision Justifications for Wireless Network Selection. 1-7 - Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese:
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat. 8-15 - Taciane Martimiano, Jean Everson Martina, Maina M. Olembo, Marcelo Carlomagno Carlos:
Modelling User Devices in Security Ceremonies. 16-23
Security and Human Behaviour
- Sven Uebelacker, Susanne Quiel:
The Social Engineering Personality Framework. 24-30 - Jaap Boender, Marieta Georgieva Ivanova, Florian Kammüller, Giuseppe Primiero:
Modeling Human Behaviour with Higher Order Logic: Insider Threats. 31-39
Socio-technical Security
- Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen:
What You Enter Is What You Sign: Input Integrity in an Online Banking Environment. 40-47 - Lydia Kraus, Ina Wechsung, Sebastian Möller:
Using Statistical Information to Communicate Android Permission Risks to Users. 48-55
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.