L. Shanley, Michael N. Johnstone, Michael Crowley, Patryk Szewczyk
{"title":"Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?","authors":"L. Shanley, Michael N. Johnstone, Michael Crowley, Patryk Szewczyk","doi":"10.1007/978-3-030-57404-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_1","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does Ubuntu Influence Social Engineering Susceptibility?","authors":"Ntsewa B. Mokobane, R. Botha","doi":"10.1007/978-3-030-57404-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_8","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law Enforcement","authors":"Joseph Williams, Paul Stephens","doi":"10.1007/978-3-030-57404-8_26","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_26","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing User eXperience: A Review for the End-Users' Software Robustness","authors":"Panagiotis Zagouras, Christos Kalloniatis","doi":"10.1007/978-3-030-57404-8_21","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_21","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Responding to KRACK: Wi-Fi Security Awareness in Private Households","authors":"J. Freudenreich, Jake Weidman, Jens Grossklags","doi":"10.1007/978-3-030-57404-8_18","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_18","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132949672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical Analysis of Information Security Culture Definitions","authors":"Z. Ruhwanya, Jacques Ophoff","doi":"10.1007/978-3-030-57404-8_27","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_27","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of an Information Privacy Perception Instrument at a Zimbabwean University","authors":"Kudakwashe Maguraushe, A. D. Veiga, N. Martins","doi":"10.1007/978-3-030-57404-8_23","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_23","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Addressing SME Characteristics for Designing Information Security Maturity Models","authors":"B. Ozkan, M. Spruit","doi":"10.1007/978-3-030-57404-8_13","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_13","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg
{"title":"Exploring the Meaning of \"Usable Security\"","authors":"Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg","doi":"10.1007/978-3-030-57404-8_19","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_19","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121382335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. N. Al-Ameen, Apoorva Chauhan, M. Ahsan, Huzeyfe Kocabas
{"title":"\"Most Companies Share Whatever They Can to Make Money!\": Comparing User's Perceptions with the Data Practices of IoT Devices","authors":"M. N. Al-Ameen, Apoorva Chauhan, M. Ahsan, Huzeyfe Kocabas","doi":"10.1007/978-3-030-57404-8_25","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_25","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115606280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}