In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Second International Conference on Human Aspects of Information Security & Assurance (HAISA 2008)Nathan Clarke, Steven Furnell (Ed.) |
- The cycle of deception - a model of social engineering attacks, defenses and victims
Marcus Nohlberg, Stewart Kowalski
pp1-11
- A Practical Assessment of Social Engineering Vulnerabilities
Taimur Bakhshi, Maria Papadaki, Steven Furnell
pp12-23
- secalyser – a system to plan training for employees
Jan Schlüter, Stephanie Teufel
pp24-34
- Human, Organizational and Technological Challenges of Implementing IT Security in Organizations
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Beznosov
pp35-47
- Cultivating an Atmosphere of Proactive Computer
Security to Mitigate Limited End-User Awareness
Martyn Styles, Theodore Tryfonas
pp48-55
- Security and privacy awareness of home PC users in Norway
Freddy Andreassen, Einar Snekkenes
pp56-68
- Identifying Differences between Security and other IT Professionals: a Qualitative Analysis
Andre Gagne, Kasia Muldner, Konstantin Beznosov
pp69-79
- A method for ranking authentication products
Kirsi Helkala, Einar Snekkenes
pp80-93
- Digital Fingerprinting Based on Keystroke Dynamics
Ahmed Awad E Ahmed, Traore Issa, Almulhem Ahmed
pp94-104
- A Usability Analysis of the Autopsy Forensic Browser
David James Bennett, Paul Stephens
pp105-115
- How addressing implementation issues can assist in medical information security governance
Trish Williams
pp116-125
- The Threat of Political Phishing
Christopher Soghoian, Oliver Friedrichs, Markus Jakobsson
pp126-143