Abstract is missing.
- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?Leah Shanley, Michael N. Johnstone, Michael Crowley, Patryk Szewczyk. 3-15 [doi]
- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South AfricaAdéle da Veiga, Jacques Ophoff. 16-29 [doi]
- A Review of Information Security Aspects of the Emerging Covid-19 Contact Tracing Mobile Phone ApplicationsGeorgios Magklaras, Lucia Nikolaia López-Bojórquez. 30-44 [doi]
- Towards a Cross-Cultural Education Framework for Online Safety AwarenessRam Herkanaidu, Steven M. Furnell, Maria Papadaki. 47-57 [doi]
- Towards an Heuristic Approach to Cybersecurity and Online Safety PedagogySimon Marsden. 58-70 [doi]
- ContextBased MicroTraining: A Framework for Information Security TrainingJoakim Kävrestad, Marcus Nohlberg. 71-81 [doi]
- Employees' Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical TestMohammed Khaled N. Alotaibi. 85-96 [doi]
- Does Ubuntu Influence Social Engineering Susceptibility?Ntsewa B. Mokobane, Reinhardt A. Botha. 97-108 [doi]
- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection TheoryPloy Unchit, S. Das, A. Kim, L. Jean Camp. 109-120 [doi]
- KidsDoodlePass: An Exploratory Study of an Authentication Mechanism for Young ChildrenEsra Alkhamis, Helen Petrie, Karen Renaud. 123-132 [doi]
- Information Security Behavioural Threshold Analysis in Practice: An Implementation FrameworkDirk P. Snyman, Hennie A. Kruger. 133-143 [doi]
- Information Security Behavior: Development of a Measurement Instrument Based on the Self-determination TheoryYotamu Gangire, Adéle da Veiga, Marlien Herselman. 144-157 [doi]
- Addressing SME Characteristics for Designing Information Security Maturity ModelsBilge Yigit Ozkan, Marco Spruit. 161-174 [doi]
- Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree ApprenticeshipsIsmini Vasileiou. 175-185 [doi]
- Internet Self-regulation in Higher Education: A Metacognitive Approach to Internet AddictionDean John von Schoultz, Kerry-Lynn Thomson, Johan Van Niekerk. 186-207 [doi]
- Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android DevicesBehnood Momenzadeh, Shakthidhar Gopavaram, S. Das, L. Jean Camp. 211-223 [doi]
- Exploring Information Security and Domestic EqualityMarcus Nohlberg, Joakim Kävrestad. 224-232 [doi]
- Responding to KRACK: Wi-Fi Security Awareness in Private HouseholdsJan Freudenreich, Jake Weidman, Jens Grossklags. 233-243 [doi]
- Exploring the Meaning of "Usable Security"Markus Lennartsson, Joakim Kävrestad, Marcus Nohlberg. 247-258 [doi]
- Dyslexia and Password Usage: Accessibility in Authentication DesignKaren Renaud, Graham Johnson, Jacques Ophoff. 259-268 [doi]
- Securing User eXperience: A Review for the End-Users' Software RobustnessPanagiotis Zagouras, Christos Kalloniatis. 269-285 [doi]
- SMEs' Confidentiality Concerns for Security Information SharingAlireza Shojaifar, Samuel A. Fricker. 289-299 [doi]
- Validation of an Information Privacy Perception Instrument at a Zimbabwean UniversityKudakwashe Maguraushe, Adéle da Veiga, Nico Martins. 300-314 [doi]
- Are We Really Informed on the Rights GDPR Guarantees?Maria Sideri, Stefanos Gritzalis. 315-326 [doi]
- "Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT DevicesMahdi Nasrullah Al-Ameen, Apoorva Chauhan, M. A. Manazir Ahsan, Huzeyfe Kocabas. 329-340 [doi]
- Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law EnforcementJoseph Williams, Paul Stephens. 341-352 [doi]
- Critical Analysis of Information Security Culture DefinitionsZainab Ruhwanya, Jacques Ophoff. 353-365 [doi]