default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 341 matches
- 2023
- Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing. HAISA 2023: 324-336 - Najla Aldaraani, Helen Petrie, Siamak F. Shahandashti:
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia. HAISA 2023: 364-376 - Fayez Alotaibi, Steven Furnell, Ying He:
Cyber Security Awareness and Education Support for Home and Hybrid Workers. HAISA 2023: 64-75 - Saud Alotaibi, Steven Furnell, Y. He:
Towards a Framework for the Personalization of Cybersecurity Awareness. HAISA 2023: 143-153 - Erik Bergström, Martin Lundgren, Karin Bernsmed, Guillaume Bour:
"Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk Management. HAISA 2023: 181-191 - Sinazo Brown, Zainab Ruhwanya, Ayanda Pekane:
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers. HAISA 2023: 432-444 - Daniel G. Conway, Marcus A. Butavicius, Kun Yu, Fang Chen:
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address. HAISA 2023: 310-323 - Lynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza:
Key Elements for Cybersafety Education of Primary School Learners in South Africa. HAISA 2023: 116-128 - Marcus Gerdin, Åke Grönlund, Ella Kolkowska:
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research. HAISA 2023: 470-481 - Magdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul:
Cyber Range Exercises: Potentials and Open Challenges for Organizations. HAISA 2023: 24-35 - Tapiwa Gundu:
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT. HAISA 2023: 418-431 - David Hedberg, Martin Lundgren, Marcus Nohlberg:
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops. HAISA 2023: 275-284 - Michael de Jager, Lynn Futcher, Kerry-Lynn Thomson:
An Investigation into the Cybersecurity Skills Gap in South Africa. HAISA 2023: 237-248 - Alexander Joukov, Nikolai Joukov:
Six-Year Study of Emails Sent to Unverified Addresses. HAISA 2023: 337-345 - Kristian Kannelønning, Sokratis K. Katsikas:
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry. HAISA 2023: 249-258 - Joakim Kävrestad, Wesam Fallatah, Steven Furnell:
Cybersecurity Training Acceptance: A Literature Review. HAISA 2023: 53-63 - Joakim Kävrestad, David Lindvall, Marcus Nohlberg:
Combating Digital Exclusion with Cybersecurity Training - An Interview Study with Swedish Seniors. HAISA 2023: 3-12 - Urvashi Kishnani, Srinidhi Madabhushi, Sanchari Das:
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective. HAISA 2023: 296-309 - Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik:
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education. HAISA 2023: 105-115 - Khutso Lebea, Wai Sze Leung:
Decreasing Physical Access Bottlenecks through Context-Driven Authentication. HAISA 2023: 285-295 - Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock:
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs). HAISA 2023: 211-224 - Célia Martinie, Bilal Naqvi:
On using the Task Models for Validation and Evolution of Usable Security Design Patterns. HAISA 2023: 405-417 - Leonardo A. Martucci, Jonathan Magnusson, Mahdi Akil:
On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons Learned. HAISA 2023: 76-90 - Vuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk:
A Review of Constructive Alignment in Information Security Educational Research. HAISA 2023: 461-469 - Emilia N. Mwim, Jabu Mtsweni, Bester Chimbo:
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitalsin South Africa. HAISA 2023: 129-142 - Lorenzo Neil, Julie M. Haney, Kerrianne Buchanan, Charlotte Healy:
Analyzing Cybersecurity Definitions for Non-experts. HAISA 2023: 391-404 - Nandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan:
It's More Than Just Money: The Real-World Harms from Ransomware Attacks. HAISA 2023: 261-274 - Andrew Reeves, Malcolm R. Pattinson, Marcus A. Butavicius:
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals. HAISA 2023: 225-236 - Elham Rostami, Fredrik Karlsson:
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security Policies. HAISA 2023: 157-168 - Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell:
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. HAISA 2023: 349-363
skipping 311 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-02 04:29 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint