Human Aspects of Information Security and Assurance, Gebunden
Human Aspects of Information Security and Assurance
- 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Steven Furnell, Nathan Clarke
- Verlag:
- Springer, 07/2023
- Einband:
- Gebunden, HC runder Rücken kaschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783031385292
- Artikelnummer:
- 11556056
- Umfang:
- 496 Seiten
- Gewicht:
- 904 g
- Maße:
- 241 x 160 mm
- Stärke:
- 33 mm
- Erscheinungstermin:
- 26.7.2023
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Weitere Ausgaben von Human Aspects of Information Security and Assurance |
Preis |
|---|---|
| Buch, Gebunden, Englisch | EUR 131,42* |
Klappentext
¿Education & Training.- Combating digital exclusion with cybersecurity training - an interview study with Swedish seniors.- Another look at cybersecurity awareness programs.- Cyber range exercises: potentials and open challenges for organisations.- An adaptive plug-and-play (PnP) interactive platform for an e-voting based cybersecurity curricula.- Cybersecurity training acceptance: a literature review.- Cyber security awareness and education support for home and hybrid workers.- On-campus hands-on ethical hacking course: design, deployment and lessons learned.- Planning for professional development in cybersecurity: a new curriculum design.- A comprehensive design framework for multi-disciplinary cyber security education.- Key elements for cybersafety education of primary school learners in South Africa.- Factors associated with cybersecurity culture: a. quantitative study of public e-health hospitals in South Africa.- Towards a framework for the personalization of cybersecurity awareness.- Management, Policy & Skills.- A qualitative content analysis of actionable advice in Swedish public agencies' information security policies.- Business language for information security.- Check, check, check, we got those" - Catalogue use in information security risk management.- Proposed guidelines for website data privacy policies and an application thereof.- Towards roles and responsibilities in cyber security awareness framework for South African Small, Medium and Micro Enterprises (SMMEs).- Is your CISO burnt out yet? Examining demographic differences in workplace burnout amongst cyber security professionals.- An investigation into the cybersecurity skills gap in South Africa.- Cybersecurity-related behavior of personnel in the Norwegian industry.- Evolving Threats & Attacks.- Its's more than just money: the real-world harms from ransomware attacks.- Cyberthreats in modern cars: responsibility and readiness of auto workshops.- Decreasing physical access bottlenecks through context-driven authentication.- Blockchain in oil and gas supply chain: a literature review from user security and privacy perspective.- Are people with cyber security training worse at checking phishing email addresses? Testing the automaticity of verifying the sender's address.- Content analysis of persuasion princples in mobile instant message phishing.- Six-year study of emails sent to unverified addresses.- Social-Technical Factors.- Evaluating the risks of human factors associated with social media cybersecurity threats.- Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia.- To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks.- Analyzing cyber security definitions for non-experts.- On using the task models for validation and evolution of usable security design patterns.- Chatbots: a framework for improving information security behaviors using ChatGPT.- Factors influencing Internet of Medical Things (IoMT) cybersecurity protective behaviors among healthcare workers.- The influence of interpersonal factors on telecommuting employees' cybercrime preventative behaviors during the pandemic.- Research Methods.- A review of constructive alignment in information security educational research.- What goes around comes around; effects of unclear questionnaire items in information security research.