Abstract is missing.
- Persuading End Users to Act Cautiously Online: Initial Findings of a Fear Appeals Study on PhishingJurjen Jansen, Paul van Schaik. 1-11 [doi]
- Understanding susceptibility to phishing emails: Assessing the impact of individual differences and cultureMarcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac, Dragana Calic, Meredith Lillie. 12-23 [doi]
- Mapping the Anatomy of Social Engineering Attacks to the Systems Engineering Life CycleJohan van de Merwe, Francois Mouton. 24-40 [doi]
- Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing AttacksGaurav Misra, Nalin Asanka Gamagedara Arachchilage, Shlomo Berkovsky. 41-51 [doi]
- A comperhansive framework for cultivating and assessing Information Security Culture Alaa Tolah, Steven Furnell, Maria Papadaki. 52-64 [doi]
- The influence of data protection regulation on the information security culture of an organisation - A case study comparing legislation and offices across jurisdictionsAdéle da Veiga. 65-79 [doi]
- Understanding the Relationships between Resilience, Work Stress and Information Security AwarenessAgata McCormac, Dragana Calic, Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Meredith Lillie. 80-90 [doi]
- The Lemming Effect in Information SecurityDirk Snyman, Hennie Kruger, Wayne D. Kearney. 91-103 [doi]
- How Reliable are Experts’ Assessments? A Case Study on UAV SecurityAbdulhadi Shoufan, Ernesto Damiani. 104-113 [doi]
- The Influence of Organizational Commitment on Information Security Policy ComplianceVal Hooper, Jacques Ophoff. 114-125 [doi]
- Identifying the Factors Affecting End-Users’ Risk-Taking BehaviorManal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell. 126-144 [doi]
- Securing mobile devices: Evaluating the relationship between risk perception, organisational commitment and information security awarenessAndrew Reeves, Kathryn Parsons, Dragana Calic. 145-155 [doi]
- Digital Wellness: Concepts of cybersecurity presented visually for childrenSuné von Solms. 156-166 [doi]
- Employee Information Security Beliefs in the Home EnvironmentJoseph Omidosu, Jacques Ophoff. 167-176 [doi]
- Involving Users in the Design of a Serious Game for Security Questions EducationNicholas Micallef, Nalin Asanka Gamagedara Arachchilage. 177-187 [doi]
- An Information Privacy Culture Index Framework and Instrument to Measure Privacy Perceptions across Nations: Results of an Empirical StudyAdéle da Veiga. 188-201 [doi]
- Privacy Enhancing Tools: A Literature Review on End-User Role and EvaluationAli Mohammad Padyab, Anna Ståhlbröst. 202-214 [doi]
- Factors Influencing the Use of Privacy Settings in Location-Based Social NetworksHenry Oladimeji, Jacques Ophoff. 215-224 [doi]
- Jurisdictional Issues in Cloud ForensicsMichael James, Patryk Szewczyk. 225-235 [doi]
- Why Open Government is good for cybersecurity and public trust - now would be a good time to startChris Culnane, Vanessa Teague. 236-250 [doi]
- What Do They Really Think? Overcoming Social Acceptability Bias in Information Security ResearchDebi Ashenden. 251-260 [doi]
- Towards the Design of a Cybersecurity Module for Postgraduate Engineering StudiesSuné von Solms, Lynn Futcher. 261-271 [doi]
- An Analysis of Unauthorized Wireless Network Usage in Western AustraliaPatryk Szewczyk, Dan Blackman, Krishnun Sansurooah. 272-281 [doi]
- Secure Coding Practices in the Software Development Capstone ProjectsVuyolwethu Sizoli Mdunyelwa, Johannes Frederick Van Niekerk, Lynn Ann Futcher. 282-291 [doi]
- The Socio-Technical Impact on Security of the Healthcare Internet of Things in the Use of Personal Monitoring Devices (PMDs)Asanka I Pathirana, Patricia A. H. Williams. 292-302 [doi]