In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)Steven Furnell, Nathan Clarke (Ed.) |
- An Ontology for a National Cyber-Security Culture Environment
Noluxolo Gcaza, Rossouw Von Solms, Joey Jansen van Vuuren
pp1-10
- An Information Security Culture Model Validated with Structural Equation Modelling
Nico Martins, Adele Da Veiga
pp11-21
- The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case Study
Adele Da Veiga
pp22-33
- A Cyber Security Culture Fostering Campaign through the Lens of Active Audience Theory
Rayne Reid, Johan van Niekerk
pp34-44
- Enlighten Information Morals through Corporate Culture
Abdullah Akmubark, Nobutoshi Hatanaka, Osamu Uchida, Yukiyo Ikeda
pp45-56
- Examining Attitudes toward Information Security Behaviour using Mixed Methods
Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram
pp57-70
- Inter-Organisational Information Sharing – Between a Rock and a Hard Place
Fredrik Karlsson, Ella Kolkowska, Karin Hedström, Magnus Frostenson
pp71-81
- Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness
Waldo Flores, Mathias Ekstedt
pp82-94
- An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture
Adele Da Veiga
pp95-107
- Effect of Motivation and Physical Fitness on Cyber Tasks
Kirsi Helkala, Silje Knox, Mass Lund
pp108-119
- Studying Safe Online Banking Behaviour: A Protection Motivation Theory Approach
Jurjen Jansen
pp120-130
- New Insights Into Understanding Manager’s Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors
Miranda Kajtazi, Ella Kolkowska, Burcu Bulgurcu
pp131-140
- Arguments For Anonymity
Hazel Webb, Nick Savage, Peter Millard
pp141-150
- Understanding Security Practices Deficiencies: A Contextual Analysis
Moufida Sadok, Peter Bednar
pp151-160
- Managing Social Engineering Attacks- Considering Human Factors and Security Investment
Reza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee
pp161-171
- Mismorphism: a Semiotic Model of Computer Security Circumvention
Sean Smith, Ross Koppel, Jim Blythe, Vijay Kothari
pp172-182
- Perceived Information Security Risk as a Function of Probability and Severity
Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg
pp183-193
- Understanding User Knowledge of Computer Security and Risk: A Comparative Study
Craig Thurlby, Caroline Langensiepen, John Haggerty, Robert Ranson
pp194-203
- Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do'
Timothy Kelley, Bennett Bertenthal
pp204-214
- Cyber Threat Incident Handling Procedure for South African Schools
Naume Sonhera, Elmarie Kritzinger, Marianne Loock
pp215-232
- Ethical Dilemmas and Dimensions in Penetration Testing
Shamal Faily, John McAlaney, Claudia Iacob
pp233-242
- The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City
Liezel Cilliers, Stephen Flowerday
pp243-255
- Online Fraud Defence by Context Based Micro Training
Joakim Kävrestad, Marcus Nohlberg
pp256-264
- Human factors related to the performance of intrusion detection operators
Patrik Lif, Teodor Sommestad
pp265-275
- Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers
Neil McDonald, Shamal Faily, Marcella Favale, Christos Gatzidis
pp276-285