


default search action
18th HAISA 2024: Skövde, Sweden
- Nathan L. Clarke
, Steven Furnell
:
Human Aspects of Information Security and Assurance - 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9-11, 2024, Proceedings, Part I. IFIP Advances in Information and Communication Technology 721, Springer 2025, ISBN 978-3-031-72558-6
Management and Risk
- Tobias Reittinger
, Magdalena Glas
, Sarah Aminzada
, Günther Pernul
:
Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality. 3-16 - Noluhle Makhubalo
, Dirk Snyman
:
Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector. 17-31 - Samantha Phillips
, Malte Hansen
, Amukelani Matsilele
:
Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists. 32-46 - Najla Aldaraani
, Helen Petrie
, Siamak F. Shahandashti
:
A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats. 47-60 - James Clark, Zainab Ruhwanya
:
Investigating the Factors Influencing Individuals' Self-sovereign Identity Adoption Intentions. 61-78 - Christine Große
:
"There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the Digital Age. 79-92 - Raymond Agyemang
, Steven Furnell
, Tim Muller
:
A Profile-Based Cyber Security Readiness Assessment Framework at Country Level. 93-106 - Erik Bergström
, Simon Andersson
, Martin Lundgren
:
To Risk Analyse, or Not to Risk Analyse: That's the Question. 107-119 - Emelie Mannebäck, Rose-Mharie Åhlfeldt
:
Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review. 120-133 - Salim Awudu, Sotirios Terzis
:
Information Security Management in Digitized Identity Systems - The Case of the Ghanaian National Identification Authority (NIA). 134-147 - Neeshe Khan
, Steven Furnell
, Maria Bada
, Jason R. C. Nurse
, Matthew Rand
:
Assessing Cyber Security Support for Small and Medium-Sized Enterprises. 148-162
Social Engineering
- Nathan Monsoro
, Célia Martinie
, Philippe A. Palanque
, Théo Saubanère
:
A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks. 165-179 - Carlo Kopp
:
Defining Measures of Effect for Disinformation Attacks. 180-199 - Stella Kazamia, Chris Culnane, Daniel Gardham, Suzanne Prior, Helen Treharne:
Phish and Tips: - Phishing Awareness and Education for Older Adults. 200-214 - Mattia Mossano
, Melanie Volkamer
:
Literature Review: Misconceptions About Phishing. 215-228
Technical Attacks and Defenses
- Louis Hassett, Daniel Ogwok:
Linux Kernel Keyloggers and Information Security. 231-242 - J. Scott-King, Zainab Ruhwanya
:
The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry. 243-263 - Tristen K. Amador, Roberta A. Mancuso
, Steven Fulton
, Erik L. Moore
, Daniel M. Likarish
:
An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack. 264-277 - Ebenhaeser Otto Janse van Rensburg
, Reinhardt A. Botha
, Bertram Haskins
:
Research Agenda for Speaker Authentication. 278-291
Usable Security
- Nourah Alshomrani
, Steven Furnell
, Helena Webb
:
A Unified Privacy and Permission Management Framework. 295-307 - Helen Petrie
, Gayathri Sreekumar
, Siamak F. Shahandashti
:
Understanding Users' Mental Models of Federated Identity Management (FIM): Use of a New Tangible Elicitation Method. 308-322 - Joakim Kävrestad
, Richard Fernow, David Lööf, Marcus Birath
:
Multi-factor Authentication Adoption: A Comparison Between Digital Natives and Digital Immigrants in Sweden. 323-338 - Patrick Shirazi
, Ali Padyab
:
Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations. 339-354 - Arwa Binsedeeq
, Steven Furnell
, Kirsi Helkala
, Naomi Woods
, Darren Chadwick
, Chris Fullwood
, Xavier Carpent
, Nicholas Gervassis
:
Assessing the Cybersecurity Needs and Experiences of Disabled Users. 355-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.