Abstract is missing.
- Which Individual, Cultural, Organisational and Interventional Factors Explain Phishing Resilience?Kathryn Parsons, Marcus A. Butavicius, Meredith Lillie, Dragana Calic, Agata McCormac, Malcolm R. Pattinson. 1-11 [doi]
- A Social Engineering Prevention Training Tool: Methodology and Design for Validating the SEADMFrancois Mouton, Michael Pepper, Thomas Meyer. 12-27 [doi]
- Motivating Users to Consider Recommendations on Password Management StrategiesPeter Mayer, Alexandra Kunz, Melanie Volkamer. 28-37 [doi]
- The Quest to Replace Passwords Revisited - Rating Authentication SchemesVerena Zimmermann, Nina Gerber, Marius Kleboth, Alexandra von Preuschen, Konstantin Schmidt, Peter Mayer. 38-48 [doi]
- An Authentic Self: Big Data and Passive Digital FootprintsLynne Y. Williams, Diane Rasmussen Pennington. 49-56 [doi]
- Are Attributes on Social Media Platforms Usable for Assisting in the Automatic Detection of Identity Deception?Estée van der Walt, Jan Harm Petrus Eloff. 57-66 [doi]
- Adapting Cyber-Security Training to Your EmployeesMalcolm R. Pattinson, Marcus A. Butavicius, Beau Ciccarello, Meredith Lillie, Kathryn Parsons, Dragana Calic, Agata McCormac. 67-79 [doi]
- Cybersecurity Awareness and Education: A Necessary Parameter for Smart CommunitiesNoluxolo Gcaza. 80-90 [doi]
- Social Networking: A Tool for Effective Cybersecurity Education in Cyber-Driven Financial TransactionsRahul Maharaj, Rossouw von Solms. 91-100 [doi]
- A Systematic Review of Information Security Knowledge-Sharing ResearchSaad Al-Ahmari, Karen Renaud, Inah Omoronyia. 101-110 [doi]
- Designing an Anti-Cyberbullying Programme in ThailandRam Herkanaidu, Steven Furnell, Maria Papadaki, Tharabun Khuchinda. 111-122 [doi]
- An Educational Intervention Towards Safe Smartphone UsageWiehan Janse Van Rensburg, Kerry-Lynn Thomson, Lynn Ann Futcher. 123-134 [doi]
- Privacy Practices, Preferences, and Compunctions: WhatsApp Users in IndiaJayati Dev, Sanchari Das, Linda Jean Camp. 135-146 [doi]
- POINTER: A GDPR-Compliant Framework for Human Pentesting (for SMEs)Jacqueline Archibald, Karen Renaud. 147-157 [doi]
- The Impact of Artificial Intelligence on the Human Aspects of Information and CybersecurityMasike Malatji, Annlizé Marnewick, Suné von Solms. 158-169 [doi]
- Warn if Secure or How to Deal with Security by Default in Software Development?Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller 0001. 170-190 [doi]
- Analysis of Published Public Sector Information Security Incidents and Breaches to establish the Proportions of Human ErrorMark Glenn Evans, Ying He 0004, Iryna Yevseyeva, Helge Janicke. 191-202 [doi]
- Defining and Modelling the Online Fraud ProcessJoakim Kävrestad, Marcus Nohlberg. 203-213 [doi]
- Human Factors in a Computable Cybersecurity Risk ModelSophie Y. Williams, Damien Marriott. 214-224 [doi]
- Self-disclosing on Facebook can be Risky: Examining the Role of Trust and Social CapitalDragana Calic, Mary Brushe, Kathryn Parsons, Christopher Brittain. 225-235 [doi]
- Investigating the Knowledge-Behaviour Gap in Mitigating Personal Information CompromiseJasmine Scott, Jacques Ophoff. 236-245 [doi]
- The BYOD Information Security Challenge for CIOsAlfred Musarurwa, Stephen Flowerday. 246-262 [doi]
- Rationalising Decision Making about Risk: A Normative ApproachAndrew M'manga, Shamal Faily, Chris Williams, John McAlaney. 263-271 [doi]
- Easing the Burden of Security Self-AssessmentsChristopher Schmitz, André Sekulla, Sebastian Pape 0001, Volkmar Pipek, Kai Rannenberg. 272-281 [doi]