{"title":"Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction","authors":"Dean John von Schoultz, K. Thomson, J. V. Niekerk","doi":"10.1007/978-3-030-57404-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_15","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122707051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework","authors":"Dirk P. Snyman, H. Kruger","doi":"10.1007/978-3-030-57404-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_11","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring Information Security and Domestic Equality","authors":"Marcus Nohlberg, Joakim Kävrestad","doi":"10.1007/978-3-030-57404-8_17","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_17","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ContextBased MicroTraining: A Framework for Information Security Training","authors":"Joakim Kävrestad, Marcus Nohlberg","doi":"10.1007/978-3-030-57404-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_6","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination Theory","authors":"Yotamu Gangire, A. D. Veiga, M. Herselman","doi":"10.1007/978-3-030-57404-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_12","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ploy Unchit, Sanchari Das, Sanchari Das, Andrew Kim, L. Camp
{"title":"Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory","authors":"Ploy Unchit, Sanchari Das, Sanchari Das, Andrew Kim, L. Camp","doi":"10.1007/978-3-030-57404-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-57404-8_9","url":null,"abstract":"","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Information Security Compliance - Why Goal Setting and Rewards Might be a Bad Idea","authors":"N. Gerber, Ronja McDermott, M. Volkamer, J. Vogt","doi":"10.5445/IR/1000081976","DOIUrl":"https://doi.org/10.5445/IR/1000081976","url":null,"abstract":"Since organizational information security policies can only improve security if employees comply with them, understanding the factors that affect employee security compliance is crucial for strengthening information security. Based on a survey with 200 German employees, we find that reward for production goal achievement negatively impacts security compliance. Whereas a distinct error aversion culture also seems to impair security compliance, the results provide no evidence for an impact of error management culture, affective commitment towards the organization, security policy information quality or quality of the goal setting process. Furthermore, the intention to comply with security policies turns out to be a bad predictor for actual security compliance. We therefore suggest future studies to measure actual behavior instead of behavioral intention.","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124057326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arne Renkema-Padmos, Jerome Baum, M. Volkamer, K. Renaud
{"title":"Shake Hands to Bedevil: Securing Email with Wearable Technology","authors":"Arne Renkema-Padmos, Jerome Baum, M. Volkamer, K. Renaud","doi":"10.5281/ZENODO.11163","DOIUrl":"https://doi.org/10.5281/ZENODO.11163","url":null,"abstract":"Emailers seldom encrypt, sometimes because they do not see the need to do this, and sometimes because they do not know how to or are prevented from doing so by the complexity of the facilitating interface. The reality is that encryption is effortful and has to be deliberately undertaken. We propose the use of a wearable device called a Weaver (WEArable EncrypteR). Weaver will be designed to be a mechanism for exchanging encrypted emails that is as simple and effortless as possible to use. Our design philosophy was inspired by the industrial designer Naoto Fukusawa who talks about \"design dissolving into behaviour\". We want to arrive at seamless secure communication between people who initially meet in person to establish a trusting relationship by \"weaving\" their devices. This can be subsequently exploited to facilitate the exchange of secure emails between the wearers of the Weavers.","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126699580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour","authors":"K. Thomson, J. V. Niekerk","doi":"10.1108/09685221211219191","DOIUrl":"https://doi.org/10.1108/09685221211219191","url":null,"abstract":"Purpose – The protection of organisational information assets is a human problem. It is widely acknowledged that an organisation's employees are the weakest link in the protection of the organisation's information assets. Most current approaches towards addressing this human problem focus on awareness and educational activities and do not necessarily view the problem from a holistic viewpoint. Combating employee apathy and motivating employees to see information security as their problem is often not adequately addressed by “isolated” awareness activities. The purpose of this paper is to show how employee apathy towards information security can be addressed through the use of existing theory from the social sciences.Design/methodology/approach – By means of a literature study, three key organizational environments that could exist are identified and explored. Goal‐setting theory is then investigated. Finally, arguments are presented to show how goal‐setting theory could be used to actively foster an organ...","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127019559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher Soghoian, Oliver Friedrichs, M. Jakobsson
{"title":"The Threat of Political Phishing","authors":"Christopher Soghoian, Oliver Friedrichs, M. Jakobsson","doi":"10.2139/SSRN.1459790","DOIUrl":"https://doi.org/10.2139/SSRN.1459790","url":null,"abstract":"Internet based donations to political candidates are now a vital part of any successful campaign. Tens of millions of dollars are raised online each year, primarily in sub one hundred dollar amounts from individuals around the country. Politicians have exempted their own campaign donation solicitation emails from federal anti-spam legislation, and their campaigns encourage risky behavior by teaching users that it is OK to click the 'donate' button on an unsolicited email that arrives from a candidate. While not yet a major problem, fraudulent websites that masquerade as genuine campaign sites aiming to defraud donors are a significant threat on the not-so-distant horizon. These political phishing sites are easy to create, and extremely difficult for users to detect as not authentic. In this paper, we discuss threats against online campaign donation systems, and the unique factors which make this type of online commerce particularly vulnerable to fraud based attacks. We explore the threat that phishing attacks utilizing typo squatting and cousin domain names could pose to the 2008 presidential election. Finally, we propose a realistic and cost-effective solution to the problem.","PeriodicalId":206328,"journal":{"name":"International Symposium on Human Aspects of Information Security and Assurance","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}