A. D. Veiga, E. O. Ochola, M. Mujinga, Keshnee Padayachee, E. Mwim, E. Kritzinger, Marianne Loock, Pheeha Machaka
{"title":"A Reference Point for Designing a Cybersecurity Curriculum for Universities","authors":"A. D. Veiga, E. O. Ochola, M. Mujinga, Keshnee Padayachee, E. Mwim, E. Kritzinger, Marianne Loock, Pheeha Machaka","doi":"10.1007/978-3-030-81111-2_5","DOIUrl":"https://doi.org/10.1007/978-3-030-81111-2_5","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links","authors":"R. Ahmad, S. Terzis","doi":"10.1007/978-3-031-12172-2_15","DOIUrl":"https://doi.org/10.1007/978-3-031-12172-2_15","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning for Professional Development in Cybersecurity: A New Curriculum Design","authors":"Eliana Stavrou","doi":"10.1007/978-3-031-38530-8_8","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_8","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126996627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Constructive Alignment in Information Security Educational Research","authors":"V. Mdunyelwa, L. Futcher, J. V. Niekerk","doi":"10.1007/978-3-031-38530-8_36","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_36","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126896914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon","authors":"Keshnee Padayachee","doi":"10.1007/978-3-030-81111-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-81111-2_15","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133087081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Thomani, A. Marnewick, S. V. Solms, Masike Malatji
{"title":"Cybersecurity Knowledge Requirements for a Water Sector Employee","authors":"R. Thomani, A. Marnewick, S. V. Solms, Masike Malatji","doi":"10.1007/978-3-031-12172-2_8","DOIUrl":"https://doi.org/10.1007/978-3-031-12172-2_8","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132002298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Guidelines for Website Data Privacy Policies and an Application Thereof","authors":"Armand Vorster, A. D. Veiga","doi":"10.1007/978-3-031-38530-8_16","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_16","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley
{"title":"A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results","authors":"L. Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley","doi":"10.1007/978-3-031-12172-2_18","DOIUrl":"https://doi.org/10.1007/978-3-031-12172-2_18","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On using the Task Models for Validation and Evolution of Usable Security Design Patterns","authors":"C. Martinie, Bilal Naqvi","doi":"10.1007/978-3-031-38530-8_32","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_32","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Range Exercises: Potentials and Open Challenges for Organizations","authors":"M. Glas, Fabian Böhm, Falko Schönteich, G. Pernul","doi":"10.1007/978-3-031-38530-8_3","DOIUrl":"https://doi.org/10.1007/978-3-031-38530-8_3","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}