International Symposium on Human Aspects of Information Security and Assurance最新文献

筛选
英文 中文
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction 高等教育中的网络自律:网络成瘾的元认知研究
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2020-07-08 DOI: 10.1007/978-3-030-57404-8_15
Dean John von Schoultz, K. Thomson, J. V. Niekerk
{"title":"Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction","authors":"Dean John von Schoultz, K. Thomson, J. V. Niekerk","doi":"10.1007/978-3-030-57404-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_15","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122707051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework 实践中的信息安全行为阈值分析:一个实施框架
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2020-07-08 DOI: 10.1007/978-3-030-57404-8_11
Dirk P. Snyman, H. Kruger
{"title":"Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework","authors":"Dirk P. Snyman, H. Kruger","doi":"10.1007/978-3-030-57404-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_11","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Information Security and Domestic Equality 探讨信息安全与国内平等
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2020-07-08 DOI: 10.1007/978-3-030-57404-8_17
Marcus Nohlberg, Joakim Kävrestad
{"title":"Exploring Information Security and Domestic Equality","authors":"Marcus Nohlberg, Joakim Kävrestad","doi":"10.1007/978-3-030-57404-8_17","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_17","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ContextBased MicroTraining: A Framework for Information Security Training 基于上下文的微训练:一个信息安全培训框架
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2020-07-08 DOI: 10.1007/978-3-030-57404-8_6
Joakim Kävrestad, Marcus Nohlberg
{"title":"ContextBased MicroTraining: A Framework for Information Security Training","authors":"Joakim Kävrestad, Marcus Nohlberg","doi":"10.1007/978-3-030-57404-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_6","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory 信息安全行为:基于自我决定理论的测量工具开发
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2020-07-08 DOI: 10.1007/978-3-030-57404-8_12
Yotamu Gangire, A. D. Veiga, M. Herselman
{"title":"Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory","authors":"Yotamu Gangire, A. D. Veiga, M. Herselman","doi":"10.1007/978-3-030-57404-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_12","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory 利用信号检测理论量化高中环境中鱼叉式网络钓鱼的易感性
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2020-06-29 DOI: 10.1007/978-3-030-57404-8_9
Ploy Unchit, Sanchari Das, Sanchari Das, Andrew Kim, L. Camp
{"title":"Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory","authors":"Ploy Unchit, Sanchari Das, Sanchari Das, Andrew Kim, L. Camp","doi":"10.1007/978-3-030-57404-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_9","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea 理解信息安全合规性-为什么目标设定和奖励可能是一个坏主意
N. Gerber, Ronja McDermott, M. Volkamer, J. Vogt
{"title":"Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea","authors":"N. Gerber, Ronja McDermott, M. Volkamer, J. Vogt","doi":"10.5445/IR/1000081976","DOIUrl":"https://doi.org/10.5445/IR/1000081976","url":null,"abstract":"Since organizational information security policies can only improve security if employees comply with them, understanding the factors that affect employee security compliance is crucial for strengthening information security. Based on a survey with 200 German employees, we find that reward for production goal achievement negatively impacts security compliance. Whereas a distinct error aversion culture also seems to impair security compliance, the results provide no evidence for an impact of error management culture, affective commitment towards the organization, security policy information quality or quality of the goal setting process. Furthermore, the intention to comply with security policies turns out to be a bad predictor for actual security compliance. We therefore suggest future studies to measure actual behavior instead of behavioral intention.","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124057326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Shake Hands to Bedevil: Securing Email with Wearable Technology 与恶魔握手:用可穿戴技术保护电子邮件
Arne Renkema-Padmos, Jerome Baum, M. Volkamer, K. Renaud
{"title":"Shake Hands to Bedevil: Securing Email with Wearable Technology","authors":"Arne Renkema-Padmos, Jerome Baum, M. Volkamer, K. Renaud","doi":"10.5281/ZENODO.11163","DOIUrl":"https://doi.org/10.5281/ZENODO.11163","url":null,"abstract":"Emailers seldom encrypt, sometimes because they do not see the need to do this, and sometimes because they do not know how to or are prevented from doing so by the complexity of the facilitating interface. The reality is that encryption is effortful and has to be deliberately undertaken. We propose the use of a wearable device called a Weaver (WEArable EncrypteR). Weaver will be designed to be a mechanism for exchanging encrypted emails that is as simple and effortless as possible to use. Our design philosophy was inspired by the industrial designer Naoto Fukusawa who talks about \"design dissolving into behaviour\". We want to arrive at seamless secure communication between people who initially meet in person to establish a trusting relationship by \"weaving\" their devices. This can be subsequently exploited to facilitate the exchange of secure emails between the wearers of the Weavers.","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126699580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour 透过鼓励亲社会的组织行为,消除对资讯保安的冷漠
International Symposium on Human Aspects of Information Security and Assurance Pub Date : 2012-03-16 DOI: 10.1108/09685221211219191
K. Thomson, J. V. Niekerk
{"title":"Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour","authors":"K. Thomson, J. V. Niekerk","doi":"10.1108/09685221211219191","DOIUrl":"https://doi.org/10.1108/09685221211219191","url":null,"abstract":"Purpose – The protection of organisational information assets is a human problem. It is widely acknowledged that an organisation's employees are the weakest link in the protection of the organisation's information assets. Most current approaches towards addressing this human problem focus on awareness and educational activities and do not necessarily view the problem from a holistic viewpoint. Combating employee apathy and motivating employees to see information security as their problem is often not adequately addressed by “isolated” awareness activities. The purpose of this paper is to show how employee apathy towards information security can be addressed through the use of existing theory from the social sciences.Design/methodology/approach – By means of a literature study, three key organizational environments that could exist are identified and explored. Goal‐setting theory is then investigated. Finally, arguments are presented to show how goal‐setting theory could be used to actively foster an organ...","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127019559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
The Threat of Political Phishing 政治网络钓鱼的威胁
Christopher Soghoian, Oliver Friedrichs, M. Jakobsson
{"title":"The Threat of Political Phishing","authors":"Christopher Soghoian, Oliver Friedrichs, M. Jakobsson","doi":"10.2139/SSRN.1459790","DOIUrl":"https://doi.org/10.2139/SSRN.1459790","url":null,"abstract":"Internet based donations to political candidates are now a vital part of any successful campaign. Tens of millions of dollars are raised online each year, primarily in sub one hundred dollar amounts from individuals around the country. Politicians have exempted their own campaign donation solicitation emails from federal anti-spam legislation, and their campaigns encourage risky behavior by teaching users that it is OK to click the 'donate' button on an unsolicited email that arrives from a candidate. While not yet a major problem, fraudulent websites that masquerade as genuine campaign sites aiming to defraud donors are a significant threat on the not-so-distant horizon. These political phishing sites are easy to create, and extremely difficult for users to detect as not authentic. In this paper, we discuss threats against online campaign donation systems, and the unique factors which make this type of online commerce particularly vulnerable to fraud based attacks. We explore the threat that phishing attacks utilizing typo squatting and cousin domain names could pose to the 2008 presidential election. Finally, we propose a realistic and cost-effective solution to the problem.","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信