researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
2011
2012
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Adéle da Veiga
Agata McCormac
Cate Jerram
Dragana Calic
Jacques Ophoff
Joakim Kävrestad
Johan Van Niekerk
Karen Renaud
Kathryn Parsons
Kerry-Lynn Thomson
Lynn Futcher
Malcolm R. Pattinson
Marcus A. Butavicius
Marcus Nohlberg
Maria Papadaki
Melanie Volkamer
Paul Dowland
Rossouw von Solms
Sanchari Das
Steven Furnell
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
aspects
assurance
awareness
culture
cyber
cybersecurity
education
factors
framework
human
information
privacy
security
social
study
towards
training
user
users
SAISMC (haisa)
Editions
Publications
Viewing Publication 1 - 100 from 341
2023
Content Analysis of Persuasion Principles in Mobile Instant Message Phishing
Rufai Ahmad
,
Sotirios Terzis
,
Karen Renaud
.
haisa 2023
:
324-336
[doi]
Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi Arabia
Najla Aldaraani
,
Helen Petrie
,
Siamak F. Shahandashti
.
haisa 2023
:
364-376
[doi]
Towards a Framework for the Personalization of Cybersecurity Awareness
Saud Alotaibi
,
Steven Furnell
,
Y. He
.
haisa 2023
:
143-153
[doi]
Cyber Security Awareness and Education Support for Home and Hybrid Workers
Fayez Alotaibi
,
Steven Furnell
,
Ying He
.
haisa 2023
:
64-75
[doi]
"Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk Management
Erik Bergström
,
Martin Lundgren
,
Karin Bernsmed
,
Guillaume Bour
.
haisa 2023
:
181-191
[doi]
Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare Workers
Sinazo Brown
,
Zainab Ruhwanya
,
Ayanda Pekane
.
haisa 2023
:
432-444
[doi]
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's Address
Daniel G. Conway
,
Marcus A. Butavicius
,
Kun Yu
,
Fang Chen 0001
.
haisa 2023
:
310-323
[doi]
An Investigation into the Cybersecurity Skills Gap in South Africa
Michael de Jager
,
Lynn Futcher
,
Kerry-Lynn Thomson
.
haisa 2023
:
237-248
[doi]
Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings
Steven Furnell
,
Nathan L. Clarke
, editors,
Volume 674 of
IFIP Advances in Information and Communication Technology
, Springer,
2023.
[doi]
Key Elements for Cybersafety Education of Primary School Learners in South Africa
Lynn Futcher
,
Kerry-Lynn Thomson
,
Lean Kucherera
,
Noluxolo Gcaza
.
haisa 2023
:
116-128
[doi]
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research
Marcus Gerdin
,
Åke Grönlund
,
Ella Kolkowska
.
haisa 2023
:
470-481
[doi]
Cyber Range Exercises: Potentials and Open Challenges for Organizations
Magdalena Glas
,
Fabian Böhm
,
Falko Schönteich
,
Günther Pernul
.
haisa 2023
:
24-35
[doi]
Chatbots: A Framework for Improving Information Security Behaviours using ChatGPT
Tapiwa Gundu
.
haisa 2023
:
418-431
[doi]
Cyberthreats in Modern Cars: Responsibility and Readiness of Auto Workshops
David Hedberg
,
Martin Lundgren
,
Marcus Nohlberg
.
haisa 2023
:
275-284
[doi]
Six-Year Study of Emails Sent to Unverified Addresses
Alexander Joukov
,
Nikolai Joukov
.
haisa 2023
:
337-345
[doi]
Cybersecurity-Related Behavior of Personnel in the Norwegian Industry
Kristian Kannelønning
,
Sokratis Katsikas
.
haisa 2023
:
249-258
[doi]
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective
Urvashi Kishnani
,
Srinidhi Madabhushi
,
Sanchari Das
.
haisa 2023
:
296-309
[doi]
Combating Digital Exclusion with Cybersecurity Training - An Interview Study with Swedish Seniors
Joakim Kävrestad
,
David Lindvall
,
Marcus Nohlberg
.
haisa 2023
:
3-12
[doi]
Cybersecurity Training Acceptance: A Literature Review
Joakim Kävrestad
,
Wesam Fallatah
,
Steven Furnell
.
haisa 2023
:
53-63
[doi]
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education
Gregor Langner
,
Steven Furnell
,
Gerald Quirchmayr
,
Florian Skopik
.
haisa 2023
:
105-115
[doi]
Decreasing Physical Access Bottlenecks through Context-Driven Authentication
Khutso Lebea
,
Wai Sze Leung
.
haisa 2023
:
285-295
[doi]
Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)
Tebogo Kesetse Lejaka
,
Adéle da Veiga
,
Marianne Loock
.
haisa 2023
:
211-224
[doi]
On using the Task Models for Validation and Evolution of Usable Security Design Patterns
Célia Martinie
,
Bilal Naqvi
.
haisa 2023
:
405-417
[doi]
On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons Learned
Leonardo A. Martucci
,
Jonathan Magnusson
,
Mahdi Akil
.
haisa 2023
:
76-90
[doi]
A Review of Constructive Alignment in Information Security Educational Research
Vuyolwethu Sizoli Mdunyelwa
,
Lynn Futcher
,
Johan Van Niekerk
.
haisa 2023
:
461-469
[doi]
Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitalsin South Africa
Emilia N. Mwim
,
Jabu Mtsweni
,
Bester Chimbo
.
haisa 2023
:
129-142
[doi]
Analyzing Cybersecurity Definitions for Non-experts
Lorenzo Neil
,
Julie M. Haney
,
Kerrianne Buchanan
,
Charlotte Healy
.
haisa 2023
:
391-404
[doi]
It's More Than Just Money: The Real-World Harms from Ransomware Attacks
Nandita Pattnaik
,
Jason R. C. Nurse
,
Sarah Turner
,
Gareth Mott
,
Jamie MacColl
,
Pia Huesch
,
James Sullivan
.
haisa 2023
:
261-274
[doi]
Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security Professionals
Andrew Reeves
,
Malcolm R. Pattinson
,
Marcus A. Butavicius
.
haisa 2023
:
225-236
[doi]
A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security Policies
Elham Rostami
,
Fredrik Karlsson 0001
.
haisa 2023
:
157-168
[doi]
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats
Fai Ben Salamah
,
Marco A. Palomino
,
Maria Papadaki
,
Matthew J. Craven
,
Steven Furnell
.
haisa 2023
:
349-363
[doi]
Planning for Professional Development in Cybersecurity: A New Curriculum Design
Eliana Stavrou
.
haisa 2023
:
91-104
[doi]
Business Language for Information Security
Dinh Uy Tran
,
Audun Jøsang
.
haisa 2023
:
169-180
[doi]
Another Look at Cybersecurity Awareness Programs
Sebastiaan H. von Solms
,
Jaco du Toit
,
Elmarie Kritzinger
.
haisa 2023
:
13-23
[doi]
Proposed Guidelines for Website Data Privacy Policies and an Application Thereof
Armand Vorster
,
Adéle da Veiga
.
haisa 2023
:
192-210
[doi]
To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider Attacks
Monica T. Whitty
,
Christopher Ruddy
,
David A. Keatley
.
haisa 2023
:
377-390
[doi]
The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the Pandemic
Tim Wright
,
Zainab Ruhwanya
,
Jacques Ophoff
.
haisa 2023
:
445-458
[doi]
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula
Muwei Zheng
,
Nathan Swearingen
,
William Silva
,
Matt Bishop
,
Xukai Zou
.
haisa 2023
:
36-52
[doi]
2022
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links
Rufai Ahmad
,
Sotirios Terzis
.
haisa 2022
:
197-206
[doi]
Online Security Attack Experience and Worries of Young Adults in the United Kingdom
Najla Aldaraani
,
Helen Petrie
,
Siamak F. Shahandashti
.
haisa 2022
:
300-309
[doi]
COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education
Jerry Andriessen
,
Steven Furnell
,
Gregor Langner
,
Carmela Luciano
,
Gerald Quirchmayr
,
Vittorio Scarano
,
Teemu Johannes Tokola
.
haisa 2022
:
66-76
[doi]
Security Fatigue: A Case Study of Data Specialists
Anusha Bhana
,
Jacques Ophoff
.
haisa 2022
:
275-284
[doi]
Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart Home
Chola Chhetri
,
Vivian Motti 0001
.
haisa 2022
:
240-250
[doi]
Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings
Nathan L. Clarke
,
Steven Furnell
, editors,
Volume 658 of
IFIP Advances in Information and Communication Technology
, Springer,
2022.
[doi]
A Model for Information Security Culture with Innovation and Creativity as Enablers
Adéle da Veiga
.
haisa 2022
:
186-196
[doi]
Applying PDCA to Security, Education, Training and Awareness Programs
Olivier de Casanove
,
Nicolas Leleu
,
Florence Sèdes
.
haisa 2022
:
39-48
[doi]
Security Culture in Industrial Control Systems Organisations: A Literature Review
Stefanos Evripidou
,
Uchenna Daniel Ani
,
Jeremy D. McK. Watson
,
Stephen Hailes
.
haisa 2022
:
133-146
[doi]
CAP: Patching the Human Vulnerability
Thaddeus Eze
,
Neil Hawker
.
haisa 2022
:
106-119
[doi]
Visual Programming in Cyber Range Training to Improve Skill Development
Magdalena Glas
,
Manfred Vielberth
,
Tobias Reittinger
,
Fabian Böhm
,
Günther Pernul
.
haisa 2022
:
3-13
[doi]
Exploring CyBOK with Topic Modeling Techniques
Ana I. González-Tablas
,
Mohammed Rashed
.
haisa 2022
:
49-65
[doi]
"Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?"
Anne Hennig
,
Heike Dietmann
,
Franz Lehr
,
Miriam Mutter
,
Melanie Volkamer
,
Peter Mayer
.
haisa 2022
:
218-227
[doi]
A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa
Madri Kruger
,
Lynn Futcher
,
Kerry-Lynn Thomson
.
haisa 2022
:
24-38
[doi]
Survey of Users' Willingness to Adopt and Pay for Cybersecurity Training
Joakim Kävrestad
,
Martin Gellerstedt
,
Marcus Nohlberg
,
Jana Rambusch
.
haisa 2022
:
14-23
[doi]
How Privacy Concerns Impact Swedish Citizens' Willingness to Report Crimes
Gunnar Lindqvist
,
Joakim Kävrestad
.
haisa 2022
:
209-217
[doi]
PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator
Enock Samuel Mbewe
,
Taveesh Sharma
,
Josiah Chavula
.
haisa 2022
:
310-327
[doi]
An Investigation into Educational Process Models for Teaching Secure Programming
Vuyolwethu Sizoli Mdunyelwa
,
Lynn Futcher
,
Johan Van Niekerk
.
haisa 2022
:
77-90
[doi]
Systematic Review of Factors that Influence the Cybersecurity Culture
Emilia N. Mwim
,
Jabu Mtsweni
.
haisa 2022
:
147-172
[doi]
An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective
Keshnee Padayachee
.
haisa 2022
:
253-264
[doi]
Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities
Karabo Pilane
,
Zainab Ruhwanya
,
Irwin Brown
.
haisa 2022
:
285-299
[doi]
Cyber4Dev Security Culture Model for African Countries
Victor Reppoh
,
Adéle da Veiga
.
haisa 2022
:
173-185
[doi]
Policy Components - A Conceptual Model for Tailoring Information Security Policies
Elham Rostami
,
Fredrik Karlsson 0001
,
Shang Gao 0002
.
haisa 2022
:
265-274
[doi]
A Novel Framework for the Development of Age Appropriate Information Security Serious Games
Rudi Serfontein
,
Riana Serfontein
.
haisa 2022
:
120-129
[doi]
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results
Leah Shanley
,
Michael N. Johnstone
,
Patryk Szewczyk
,
Michael Crowley
.
haisa 2022
:
228-239
[doi]
Cybersecurity Knowledge Requirements for a Water Sector Employee
R. Thomani
,
Annlizé Marnewick
,
Suné von Solms
,
Masike Malatji
.
haisa 2022
:
91-105
[doi]
2021
Making Access Control Easy in IoT
Vafa Andalibi
,
Jayati Dev
,
DongInn Kim
,
Eliot Lear
,
L. Jean Camp
.
haisa 2021
:
127-137
[doi]
The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords
Paul Brockbanks
,
Martin J. Butler
.
haisa 2021
:
211-222
[doi]
Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing
Max Clasen
,
Fudong Li 0001
,
David Williams
.
haisa 2021
:
148-163
[doi]
A Reference Point for Designing a Cybersecurity Curriculum for Universities
Adéle da Veiga
,
Elisha O. Ochola
,
Mathias Mujinga
,
Keshnee Padayachee
,
Emilia Mwim
,
Elmarie Kritzinger
,
Marianne Loock
,
Pheeha Machaka
.
haisa 2021
:
46-62
[doi]
Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings
Steven Furnell
,
Nathan L. Clarke
, editors,
Volume 613 of
IFIP Advances in Information and Communication Technology
, Springer,
2021.
[doi]
Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?
Jesper Holgersson
,
Joakim Kävrestad
,
Marcus Nohlberg
.
haisa 2021
:
12-21
[doi]
The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation
Daniel Hulatt
,
Eliana Stavrou
.
haisa 2021
:
138-147
[doi]
SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education
Alice Jaffray
,
Conor Finn
,
Jason R. C. Nurse
.
haisa 2021
:
35-45
[doi]
A Literature Review on Virtual Reality Authentication
John M. Jones
,
Reyhan Duezguen
,
Peter Mayer
,
Melanie Volkamer
,
Sanchari Das
.
haisa 2021
:
189-198
[doi]
Evaluation Strategies for Cybersecurity Training Methods: A Literature Review
Joakim Kävrestad
,
Marcus Nohlberg
.
haisa 2021
:
102-112
[doi]
Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints
Lee Livsey
,
Helen Petrie
,
Siamak F. Shahandashti
,
Aidan Fray
.
haisa 2021
:
199-210
[doi]
A Conceptual Information Security Culture Framework for Higher Learning Institutions
Charles Mawutor Ocloo
,
Adéle da Veiga
,
Jan Kroeze
.
haisa 2021
:
63-80
[doi]
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon
Keshnee Padayachee
.
haisa 2021
:
179-188
[doi]
Cyber Security in Healthcare Organisations
Dhrisya Ravidas
,
Malcolm R. Pattinson
,
Paula Oliver
.
haisa 2021
:
3-11
[doi]
Exploring Experiences of Using SETA in Nordic Municipalities
Aous Al Salek
,
Joakim Kävrestad
,
Marcus Nohlberg
.
haisa 2021
:
22-31
[doi]
Towards a Risk Assessment Matrix for Information Security Workarounds
Eugene Slabbert
,
Kerry-Lynn Thomson
,
Lynn Futcher
.
haisa 2021
:
164-178
[doi]
A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children
Dirk P. Snyman
,
Günther R. Drevin
,
Hennie A. Kruger
,
Lynette Drevin
,
Johann Allers
.
haisa 2021
:
91-101
[doi]
What Can We Learn from the Analysis of Information Security Policies? The Case of UK's Schools
Martin Sparrius
,
Moufida Sadok
,
Peter M. Bednar
.
haisa 2021
:
81-90
[doi]
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices
Sarah Turner
,
Jason R. C. Nurse
,
Shujun Li
.
haisa 2021
:
115-126
[doi]
2020
Employees' Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test
Mohammed Khaled N. Alotaibi
.
haisa 2020
:
85-96
[doi]
Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa
Adéle da Veiga
,
Jacques Ophoff
.
haisa 2020
:
16-29
[doi]
ContextBased MicroTraining: A Framework for Information Security Training
Joakim Kävrestad
,
Marcus Nohlberg
.
haisa 2020
:
71-81
[doi]
Exploring the Meaning of "Usable Security"
Markus Lennartsson
,
Joakim Kävrestad
,
Marcus Nohlberg
.
haisa 2020
:
247-258
[doi]
A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone Applications
Georgios Magklaras
,
Lucia Nikolaia López-Bojórquez
.
haisa 2020
:
30-44
[doi]
Towards an Heuristic Approach to Cybersecurity and Online Safety Pedagogy
Simon Marsden
.
haisa 2020
:
58-70
[doi]
Does Ubuntu Influence Social Engineering Susceptibility?
Ntsewa B. Mokobane
,
Reinhardt A. Botha
.
haisa 2020
:
97-108
[doi]
Exploring Information Security and Domestic Equality
Marcus Nohlberg
,
Joakim Kävrestad
.
haisa 2020
:
224-232
[doi]
Addressing SME Characteristics for Designing Information Security Maturity Models
Bilge Yigit Ozkan
,
Marco Spruit
.
haisa 2020
:
161-174
[doi]
Dyslexia and Password Usage: Accessibility in Authentication Design
Karen Renaud
,
Graham Johnson
,
Jacques Ophoff
.
haisa 2020
:
259-268
[doi]
Critical Analysis of Information Security Culture Definitions
Zainab Ruhwanya
,
Jacques Ophoff
.
haisa 2020
:
353-365
[doi]
Are We Really Informed on the Rights GDPR Guarantees?
Maria Sideri
,
Stefanos Gritzalis
.
haisa 2020
:
315-326
[doi]
Information Security Behavioural Threshold Analysis in Practice: An Implementation Framework
Dirk P. Snyman
,
Hennie A. Kruger
.
haisa 2020
:
133-143
[doi]
Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships
Ismini Vasileiou
.
haisa 2020
:
175-185
[doi]
Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet Addiction
Dean John von Schoultz
,
Kerry-Lynn Thomson
,
Johan Van Niekerk
.
haisa 2020
:
186-207
[doi]
Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law Enforcement
Joseph Williams
,
Paul Stephens
.
haisa 2020
:
341-352
[doi]
Securing User eXperience: A Review for the End-Users' Software Robustness
Panagiotis Zagouras
,
Christos Kalloniatis
.
haisa 2020
:
269-285
[doi]
Sign in
or
sign up
to see more results.