Human aspects of information securit...
International Symposium on Human Aspects of Information Security & Assurance (2023 :)

FindBook      Google Book      Amazon      博客來     
  • Human aspects of information security and assurance = 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Human aspects of information security and assurance/ edited by Steven Furnell, Nathan Clarke.
    其他題名: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023 : proceedings /
    其他題名: HAISA 2023
    其他作者: Furnell, Steven.
    團體作者: International Symposium on Human Aspects of Information Security & Assurance
    出版者: Cham :Springer Nature Switzerland : : 2023.,
    面頁冊數: xii, 484 p. :ill. (some col.), digital ;24 cm.
    內容註: Education & Training -- Combating digital exclusion with cybersecurity training - an interview study with Swedish seniors -- Another look at cybersecurity awareness programs -- Cyber range exercises: potentials and open challenges for organisations -- An adaptive plug-and-play (PnP) interactive platform for an e-voting based cybersecurity curricula -- Cybersecurity training acceptance: a literature review -- Cyber security awareness and education support for home and hybrid workers -- On-campus hands-on ethical hacking course: design, deployment and lessons learned -- Planning for professional development in cybersecurity: a new curriculum design -- A comprehensive design framework for multi-disciplinary cyber security education -- Key elements for cybersafety education of primary school learners in South Africa -- Factors associated with cybersecurity culture: a. quantitative study of public e-health hospitals in South Africa -- Towards a framework for the personalization of cybersecurity awareness -- Management, Policy & Skills -- A qualitative content analysis of actionable advice in Swedish public agencies' information security policies -- Business language for information security -- Check, check, check, we got those" - Catalogue use in information security risk management -- Proposed guidelines for website data privacy policies and an application thereof -- Towards roles and responsibilities in cyber security awareness framework for South African Small, Medium and Micro Enterprises (SMMEs) -- Is your CISO burnt out yet? Examining demographic differences in workplace burnout amongst cyber security professionals -- An investigation into the cybersecurity skills gap in South Africa -- Cybersecurity-related behavior of personnel in the Norwegian industry -- Evolving Threats & Attacks -- Its's more than just money: the real-world harms from ransomware attacks -- Cyberthreats in modern cars: responsibility and readiness of auto workshops -- Decreasing physical access bottlenecks through context-driven authentication -- Blockchain in oil and gas supply chain: a literature review from user security and privacy perspective -- Are people with cyber security training worse at checking phishing email addresses? Testing the automaticity of verifying the sender's address -- Content analysis of persuasion princples in mobile instant message phishing -- Six-year study of emails sent to unverified addresses -- Social-Technical Factors -- Evaluating the risks of human factors associated with social media cybersecurity threats -- Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia -- To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks -- Analyzing cyber security definitions for non-experts -- On using the task models for validation and evolution of usable security design patterns -- Chatbots: a framework for improving information security behaviors using ChatGPT -- Factors influencing Internet of Medical Things (IoMT) cybersecurity protective behaviors among healthcare workers -- The influence of interpersonal factors on telecommuting employees' cybercrime preventative behaviors during the pandemic -- Research Methods -- A review of constructive alignment in information security educational research -- What goes around comes around; effects of unclear questionnaire items in information security research.
    Contained By: Springer Nature eBook
    標題: Computer networks - Security measures -
    電子資源: https://doi.org/10.1007/978-3-031-38530-8
    ISBN: 9783031385308
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入