Human Aspects of Information Security and Assurance -

Human Aspects of Information Security and Assurance

14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings

Nathan Clarke, Steven Furnell (Herausgeber)

Buch | Softcover
XI, 367 Seiten
2021 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-57406-2 (ISBN)
74,89 inkl. MwSt
This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.*

The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions.

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.*

The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions.

*The symposium was held virtually due to the COVID-19 pandemic.

Privacy and COVID-19.- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?.- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa.- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications.- Awareness and Training.- Towards a Cross-Cultural Education Framework for Online Safety Awareness.- A heuristic point of view of cybersecurity and online safety pedagogy.- Context Based Micro Training: A Framework for Information Security Training.- Social Engineering.- Employees' Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test.- Does ubuntu influence social engineering susceptibility?.- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.- Security Behaviour.- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children.- Information security behavioural threshold analysis in practice: An implementation framework.- Information security behaviour: Development of a measurement instrument based on the self-determination theory.- Education.- Addressing SME Characteristics for Designing Information Security Maturity Models.- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships.- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction.- End-User Security.- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.- Exploring Information Security and Domestic Equality.- Responding to KRACK: Wi-Fi Security Awareness in Private Households.- Usable Security.- Exploring the meaning of "usable security".- Dyslexia and Password Usage: Accessibility in Authentication Design.- Securing User eXperience (SUX): A Review For the End-Users' Software Robustness.- Security Policy.- SMEs' Confidentiality Concerns for Security Information Sharing.- Validation of an information privacy perception instrument at a Zimbabwean university.- Are We Really Informed on the Rights GDPR Guarantees?.- Attitudes and Perceptions.- "Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT Devices.- Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law Enforcement.- Critical analysis of Information Security Culture Definitions.

Erscheinungsdatum
Reihe/Serie IFIP Advances in Information and Communication Technology
Zusatzinfo XI, 367 p. 51 illus., 30 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 581 g
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • authentication • computer crime • Computer Networks • Computer Security • Computer systems • cryptography • Data Security • Information Retrieval • Information Security • information systems • Internet • Network Protocols • Network Security • privacy • Security and Privacy • Security Systems
ISBN-10 3-030-57406-7 / 3030574067
ISBN-13 978-3-030-57406-2 / 9783030574062
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00