In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018)Nathan Clarke, Steven Furnell (Ed.) |
- Which Individual, Cultural, Organisational and Interventional Factors
Explain Phishing Resilience?
Kathryn Parsons, Marcus Butavicius, Meredith Lillie, Dragana Calic, Agata McCormac, Malcolm Pattinson
pp1-11
- A Social Engineering Prevention Training Tool: Methodology and Design for Validating the SEADM
Francois Mouton, Michael Pepper, Thomas Meyer
pp12-27
- Motivating Users to Consider Recommendations on Password Management Strategies
Peter Mayer, Alexandra Kunz, Melanie Volkamer
pp28-37
- The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Verena Zimmermann, Nina Gerber, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt, Peter Mayer
pp38-48
- An Authentic Self: Big Data and Passive Digital Footprints
Lynne Williams, Diane Pennington
pp49-56
- Are Attributes on Social Media Platforms Usable for Assisting in the Automatic Detection of Identity Deception?
Estee van der Walt, Jan Harm Petrus Eloff
pp57-66
- Adapting Cyber-Security Training to Your Employees
Malcolm Pattinson, Marcus Butavicius, Beau Ciccarello, Meredith Lillie, Kathryn Parsons, Dragana Calic, Agata McCormac
pp67-79
- Cybersecurity Awareness and Education: A Necessary Parameter for Smart Communities
Noluxolo Gcaza
pp80-90
- Social Networking: A Tool for Effective Cybersecurity Education in Cyber-Driven Financial Transactions
Rahul Maharaj, Rossouw von Solms
pp91-100
- A Systematic Review of Information Security Knowledge-Sharing Research
Saad Al-Ahmari, Karen Renaud, Inah Omoronyia
pp101-110
- Designing an Anti-Cyberbullying Programme in Thailand
Ram Herkanaidu, Steven Furnell, Maria Papadaki, Tharabun Khuchinda
pp111-122
- An Educational Intervention Towards Safe Smartphone Usage
Wiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Ann Futcher
pp123-134
- Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India
Jayati Dev, Sanchari Das, Linda Jean Camp
pp135-146
- POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs)
Jacqueline Archibald, Karen Renaud
pp147-157
- The Impact of Artificial Intelligence on the Human Aspects of Information and Cybersecurity
Masike Malatji, Annlize Marnewick, Sune von Solms
pp158-169
- Warn if Secure or How to Deal with Security by Default in Software Development?
Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller
pp170-190
- Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human Error
Mark Evans, Ying He, Iryana Yevseyeva, Helge Janicke
pp191-202
- Defining and Modelling the Online Fraud Process
Joakim Kävrestad, Marcus Nohlberg
pp203-213
- Human Factors in a Computable Cybersecurity Risk Model
Sophie Williams, Damien Marriott
pp214-224
- Self-disclosing on Facebook can be Risky: Examining the Role of Trust and Social Capital
Dragana Calic, Mary Brushe, Kathryn Parsons, Christopher Brittain
pp225-235
- Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information Compromise
Jasmine Scott, Jacques Ophoff
pp236-245
- The BYOD Information Security Challenge for CIOs
Alfred Musarurwa, Stephen Flowerday
pp246-262
- Rationalising Decision Making about Risk: A Normative Approach
Andrew M’Manga, Shamal Faily, Chris Williams, John McAlaney
pp263-271
- Easing the Burden of Security Self-Assessments
Christopher Schmitz, André Sekulla, Sebastian Pape, Volkmar Pipek, Kai Rannenberg
pp272-281