Abstract is missing.
- Cybersecurity Workforce Development DirectionsRonald Dodge, Costis Toregas, Lance J. Hoffman. 1-12 [doi]
- Creating a Security Culture Development Plan and a case studyOmar Olivos. 13-32 [doi]
- Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?Annette Sercombe, Maria Papadaki. 33-39 [doi]
- Development of Cognitive Functioning Psychological Measures for the SEADMFrancois Mouton, Mercia Malan, Hein S. Venter. 40-51 [doi]
- Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter. 52-63 [doi]
- Human Aspects of Information Security: An Empirical Study of Intentional versus Actual BehaviorAyako Komatsu, Daisuke Takagi, Toshihiko Takemura. 64-74 [doi]
- Usable Secure Email Communications - Criteria and Evaluation of Existing ApproachesCristian Thiago Moecke, Melanie Volkamer. 75-85 [doi]
- SecSDM: A usable tool to support IT undergraduate students in secure software developmentLynn Futcher, Rossouw von Solms. 86-96 [doi]
- A Framework for Evaluating Usable Security: The Case of Online Health Social Networks Alexandros Yeratziotis, Darelle van Greunen, Dalenca Pottas. 97-107 [doi]
- Towards trust and reputation for e-commerce in collectivist rural AfricaDonovan Isherwood, Marijke Coetzee, Jan H. P. Eloff. 108-118 [doi]
- An Evaluation of Linux Cybercrime Forensics Courses for European Law EnforcementPaul Stephens. 119-128 [doi]
- Intrusion detection and the role of the system administratorTeodor Sommestad, Amund Hunstad. 129-138 [doi]
- User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA ChallengesAimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos. 139-149 [doi]
- On the user acceptance of graphical passwordsAlexandra Maria Varka, Vasilios Katos. 150-159 [doi]
- Multi-Factor Authentication Using Hardware Information and User Profiling TechniquesAdeeb Alnajjar, Helge Janicke. 160-173 [doi]
- Analysis of Characteristics of Victims in Information Security Incidents: The Case of Japanese Internet UsersKen-ichi Hanamura, Toshihiko Takemura, Ayako Komatsu. 174-184 [doi]
- Dynamic Rights Reallocation In Social NetworksAdnan Ahmad, Brian Whitworth, Lech J. Janczewski. 185-194 [doi]
- Utilizing Survival Analysis for Modeling Child Hazards of Social NetworkingDimitrios Michalopoulos, Ioannis Mavridis. 195-204 [doi]
- Ethical Guidelines for Cyber-related Services Aimed at the Younger GenerationsNoluxolo Kortjan, Rossouw von Solms, Johan Van Niekerk. 205-215 [doi]