In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)Nathan Clarke, Steven Furnell (Ed.) |
- Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models
Jurjen Jansen, Paul van Schaik
pp1-11
- Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think
Dragana Calic, Malcolm Pattinson, Kathryn Parsons, Marcus Butavicius, Agata McCormac
pp12-21
- Behavioural Thresholds in the Context of Information Security
Dirk Snyman, Hennie Kruger
pp22-32
- The Effect of Organisational Culture on Employee Security Behaviour: A Qualitative Study
Lena Connolly, Michael Lang, John Gathegi, Doug Tygar
pp33-44
- IT Security Incidents Escalation in the Swedish Financial Sector: A Maturity Model Study
Gunnar Wahlgren, Anna Fedotova, Alexandra Musaeva, Stewart Kowalski
pp45-55
- Reasoning About Security and Privacy in Cloud Computing Under a Unified Meta-Model
Argyri Pattakou, Christos Kalloniatis, Stefanos Gritzalis
pp56-66
- Supporting Decision Makers in Choosing Suitable Authentication Schemes
Peter Mayer, Stephan Neumann, Daniel Storck, Melanie Volkamer
pp67-77
- Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions
Julian Dax, Benedikt Ley, Sebastian Pape, Christopher Schmitz, Volkmar Pipek, Kai Rannenberg
pp78-87
- Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture
Bahareh Shojaie, Hannes Federrath, Iman Saberi
pp88-100
- Towards the Ontology of ISO/IEC 27005:2011 Risk Management Standard
Vivek Agrawal
pp101-111
- Agile Changes of Security Landscape: A Human Factors and Security Investment View
Reza Alavi, Shareeful Islam
pp112-124
- The Design and Evaluation of an Interactive Social Engineering Training Programme
Esra Alkhamis, Karen Renaud
pp125-134
- Why do People Adopt or Reject Smartphone Security Tools?
Nora Alkaldi, Karen Renaud
pp135-144
- Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea
Nina Gerber, Ronja McDermott, Melanie Volkamer, Joachim Vogt
pp145-155
- Memorable and Secure: How Do You Choose Your PIN?
Andreas Gutmann, Melanie Volkamer, Karen Renaud
pp156-166
- Comparing Student Password Knowledge and Behaviour: A Case Study
Damian Todd Fredericks, Lynn Ann Futcher, Kerry-Lynn Thomson
pp167-178
- An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula
Lindokuhle Gcina Gomana, Lynn Ann Futcher, Kerry-Lynn Thomson
pp179-188
- The Information Security Awareness of Bank Employees
Malcolm Pattinson, Marcus Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic, Cate Jerram
pp189-198
- What Can Johnny Do?–Factors in an End-User Expertise Instrument
Prashanth Rajivan, Pablo Moriano, Timothy Kelley, Linda Jean Camp
pp199-208
- Information Security Management in SMEs: Beyond the IT Challenges
Moufida Sadok, Peter Bednar
pp209-219
- Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario
Alaa Alaqra, Simone Fischer-Hübner, John Sören Pettersson, Erik Wästlund
pp220-230
- Towards an Interdisciplinary Cyberbullying Campaign
Johan van Niekerk, Kerry-Lynn Thomson
pp231-240
- A Systematic Gap Analysis of Social Engineering Defence Mechanisms Considering Social Psychology
Peter Schaab, Kristian Beckers, Sebastian Pape
pp241-251
- Towards the Usability Evaluation of Security APIs
Peter Leo Gorski, Luigi Lo Iacono
pp252-265
- The Technological Evolution of Psychological Operations Throughout History
Francois Mouton, Kiru Pillay, Carien Van 't Wout
pp266-278
- The Threats that Insiders Pose to Critical Infrastructure – a South African Perspective
Daryll Heneke, Jacques Ophoff, Adrie Stander
pp279-289
- Near-Miss Analysis and the Availability of Software Systems
Jan Eloff, Madeleine Bihina Bella
pp290-300