International Symposium on Human Aspects of Information Security and Assurance最新文献

筛选
英文 中文
A Reference Point for Designing a Cybersecurity Curriculum for Universities 高校网络安全课程设计的参考点
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81111-2_5
A. D. Veiga, E. O. Ochola, M. Mujinga, Keshnee Padayachee, E. Mwim, E. Kritzinger, Marianne Loock, Pheeha Machaka
{"title":"A Reference Point for Designing a Cybersecurity Curriculum for Universities","authors":"A. D. Veiga, E. O. Ochola, M. Mujinga, Keshnee Padayachee, E. Mwim, E. Kritzinger, Marianne Loock, Pheeha Machaka","doi":"10.1007/978-3-030-81111-2_5","DOIUrl":"https://doi.org/10.1007/978-3-030-81111-2_5","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links 了解移动即时通讯中的网络钓鱼:对共享链接的用户行为的研究
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-12172-2_15
R. Ahmad, S. Terzis
{"title":"Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links","authors":"R. Ahmad, S. Terzis","doi":"10.1007/978-3-031-12172-2_15","DOIUrl":"https://doi.org/10.1007/978-3-031-12172-2_15","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Planning for Professional Development in Cybersecurity: A New Curriculum Design 网络安全专业发展规划:新课程设计
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-38530-8_8
Eliana Stavrou
{"title":"Planning for Professional Development in Cybersecurity: A New Curriculum Design","authors":"Eliana Stavrou","doi":"10.1007/978-3-031-38530-8_8","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_8","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Constructive Alignment in Information Security Educational Research 信息安全教育研究中的建设性结盟研究综述
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-38530-8_36
V. Mdunyelwa, L. Futcher, J. V. Niekerk
{"title":"A Review of Constructive Alignment in Information Security Educational Research","authors":"V. Mdunyelwa, L. Futcher, J. V. Niekerk","doi":"10.1007/978-3-031-38530-8_36","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_36","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126896914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon 利用欺诈五角大楼审查内部攻击的理论基础
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-81111-2_15
Keshnee Padayachee
{"title":"A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon","authors":"Keshnee Padayachee","doi":"10.1007/978-3-030-81111-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-81111-2_15","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133087081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Knowledge Requirements for a Water Sector Employee 水务部门员工网络安全知识要求
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-12172-2_8
R. Thomani, A. Marnewick, S. V. Solms, Masike Malatji
{"title":"Cybersecurity Knowledge Requirements for a Water Sector Employee","authors":"R. Thomani, A. Marnewick, S. V. Solms, Masike Malatji","doi":"10.1007/978-3-031-12172-2_8","DOIUrl":"https://doi.org/10.1007/978-3-031-12172-2_8","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof 网站资料私隐政策及其应用的建议指引
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-38530-8_16
Armand Vorster, A. D. Veiga
{"title":"Proposed Guidelines for Website Data Privacy Policies and an Application Thereof","authors":"Armand Vorster, A. D. Veiga","doi":"10.1007/978-3-031-38530-8_16","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_16","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results 澳大利亚人对隐私态度的调查:一些初步结果
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-12172-2_18
L. Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley
{"title":"A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results","authors":"L. Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley","doi":"10.1007/978-3-031-12172-2_18","DOIUrl":"https://doi.org/10.1007/978-3-031-12172-2_18","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On using the Task Models for Validation and Evolution of Usable Security Design Patterns 用任务模型验证和演化可用的安全设计模式
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-38530-8_32
C. Martinie, Bilal Naqvi
{"title":"On using the Task Models for Validation and Evolution of Usable Security Design Patterns","authors":"C. Martinie, Bilal Naqvi","doi":"10.1007/978-3-031-38530-8_32","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_32","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Range Exercises: Potentials and Open Challenges for Organizations 网络靶场练习:组织的潜力和公开挑战
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 1900-01-01 DOI: 10.1007/978-3-031-38530-8_3
M. Glas, Fabian Böhm, Falko Schönteich, G. Pernul
{"title":"Cyber Range Exercises: Potentials and Open Challenges for Organizations","authors":"M. Glas, Fabian Böhm, Falko Schönteich, G. Pernul","doi":"10.1007/978-3-031-38530-8_3","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_3","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信