In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017)Steven Furnell, Nathan Clarke (Ed.) |
- Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on Phishing
Jurjen Jansen, Paul van Schaik
pp1-11
- Understanding susceptibility to phishing emails: Assessing the impact of individual differences and culture
Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie
pp12-23
- Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life Cycle
Johan van de Merwe, Francois Mouton
pp24-40
- Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky
pp41-51
- A comperhansive framework for cultivating and assessing Information Security Culture
Alaa Tolah, Steven Furnell, Maria Papadaki
pp52-64
- The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictions
Adele Da Veiga
pp65-79
- Understanding the Relationships between Resilience, Work Stress and Information Security Awareness
Agata McCormac, Dragana Calic, Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, Meredith Lillie
pp80-90
- The Lemming Effect in Information Security
Dirk Snyman, Hennie Kruger, Wayne Kearney
pp91-103
- How Reliable are Experts’ Assessments? A Case Study on UAV Security
Abdulhadi Shoufan, Ernesto Damiani
pp104-113
- The Influence of Organizational Commitment on Information Security Policy Compliance
Val Hooper, Jacques Ophoff
pp114-125
- Identifying the Factors Affecting End-Users’ Risk-Taking Behavior
Manal Alohali, Nathan Clarke, Fudong Li, Steve Furnell
pp126-144
- Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awareness
Andrew Reeves, Kathryn Parsons, Dragana Calic
pp145-155
- Digital Wellness: Concepts of cybersecurity presented visually for children
Sune von Solms
pp156-166
- Employee Information Security Beliefs in the Home Environment
Joseph Omidosu, Jacques Ophoff
pp167-176
- Involving Users in the Design of a Serious Game for Security Questions Education
Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage
pp177-187
- An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical Study
Adele Da Veiga
pp188-201
- Privacy Enhancing Tools: A Literature Review on End-User Role and Evaluation
Ali Padyab, Anna Ståhlbröst
pp202-214
- Factors Influencing the Use of Privacy Settings in Location-Based Social Networks
Henry Oladimeji, Jacques Ophoff
pp215-224
- Jurisdictional Issues in Cloud Forensics
Michael James, Patryk Szewczyk
pp225-235
- Why Open Government is good for cybersecurity and public trust - now would be a good time to start
Chris Culnane, Vanessa Teague
pp236-250
- What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research
Debi Ashenden
pp251-260
- Towards the Design of a Cybersecurity Module for Postgraduate Engineering Studies
Sune von Solms, Lynn Futcher
pp261-271
- An Analysis of Unauthorized Wireless Network Usage in Western Australia
Patryk Szewczyk, Dan Blackman, Krishnun Sansurooah
pp272-281
- Secure Coding Practices in the Software Development Capstone Projects
Vuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher
pp282-291
- The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs)
Asanka I Pathirana, Patricia A H Williams
pp292-302