In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
6th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2012)Nathan Clarke, Steven Furnell (Ed.) |
- Cybersecurity Workforce Development Directions
Ronald Dodge, Costis Toregas, Lance Hoffman
pp1-12
- Creating a Security Culture Development Plan and a case study
Omar Olivos
pp13-32
- Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?
Annette Sercombe, Maria Papadaki
pp33-39
- Development of Cognitive Functioning Psychological Measures for the SEADM
Francois Mouton, Mercia Malan, Hein Venter
pp40-51
- Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?
Evangelos D. Frangopoulos, Mariki M Eloff, Lucas M Venter
pp52-63
- Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior
Ayako Komatsu, Daisuke Takagi, Toshihiko Takemura
pp64-74
- Usable Secure Email Communications - Criteria and
Evaluation of Existing Approaches
Cristian Moecke, Melanie Volkamer
pp75-85
- SecSDM: A usable tool to support IT undergraduate students in secure software development
Lynn Ann Futcher, Rossouw von Solms
pp86-96
- A Framework for Evaluating Usable Security: The Case of Online Health Social Networks
Alexandros Yeratziotis, Darelle van Greunen, Dalenca Pottas
pp97-107
- Towards trust and reputation for e-commerce in collectivist rural Africa
Donovan Isherwood, Marijke Coetzee, Jan Harm Petrus Eloff
pp108-118
- An Evaluation of Linux Cybercrime Forensics Courses for European Law Enforcement
Paul Stephens
pp119-128
- Intrusion detection and the role of the system administrator
Teodor Sommestad, Amund Hunstad
pp129-138
- User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges
Aimilia Tasidou, Pavlos S Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilis Katos
pp139-149
- On the user acceptance of graphical passwords
Alexandra Maria Varka, Vasilios Katos
pp150-159
- Multi-Factor Authentication Using Hardware Information and User Profiling Techniques
Adeeb Alnajjar, Helge Janicke
pp160-173
- Analysis of Characteristics of Victims in Information Security Incidents: The Case of Japanese Internet Users
Ken-ichi Hanamura, Toshihiko Takemura, Ayako Komatsu
pp174-184
- Dynamic Rights Reallocation In Social Networks
Adnan Ahmad, Brian Whitworth, Lech Janczewski
pp185-194
- Utilizing Survival Analysis for Modeling Child Hazards of Social Networking
Dimitrios Michalopoulos, Ioannis Mavridis
pp195-204
- Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations
Noluxolo Kortjan, Rossouw Von Solms, Johan Van Niekerk
pp205-215