Abstract is missing.
- Cyber Security in Healthcare OrganisationsDhrisya Ravidas, Malcolm R. Pattinson, Paula Oliver. 3-11 [doi]
- Cybersecurity and Digital Exclusion of Seniors: What Do They Fear?Jesper Holgersson, Joakim Kävrestad, Marcus Nohlberg. 12-21 [doi]
- Exploring Experiences of Using SETA in Nordic MunicipalitiesAous Al Salek, Joakim Kävrestad, Marcus Nohlberg. 22-31 [doi]
- SherLOCKED: A Detective-Themed Serious Game for Cyber Security EducationAlice Jaffray, Conor Finn, Jason R. C. Nurse. 35-45 [doi]
- A Reference Point for Designing a Cybersecurity Curriculum for UniversitiesAdéle da Veiga, Elisha O. Ochola, Mathias Mujinga, Keshnee Padayachee, Emilia Mwim, Elmarie Kritzinger, Marianne Loock, Pheeha Machaka. 46-62 [doi]
- A Conceptual Information Security Culture Framework for Higher Learning InstitutionsCharles Mawutor Ocloo, Adéle da Veiga, Jan Kroeze. 63-80 [doi]
- What Can We Learn from the Analysis of Information Security Policies? The Case of UK's SchoolsMartin Sparrius, Moufida Sadok, Peter M. Bednar. 81-90 [doi]
- A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school ChildrenDirk P. Snyman, Günther R. Drevin, Hennie A. Kruger, Lynette Drevin, Johann Allers. 91-101 [doi]
- Evaluation Strategies for Cybersecurity Training Methods: A Literature ReviewJoakim Kävrestad, Marcus Nohlberg. 102-112 [doi]
- When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home DevicesSarah Turner, Jason R. C. Nurse, Shujun Li. 115-126 [doi]
- Making Access Control Easy in IoTVafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp. 127-137 [doi]
- The Development of a Multidisciplinary Cybersecurity Workforce: An InvestigationDaniel Hulatt, Eliana Stavrou. 138-147 [doi]
- Friend or Foe: An Investigation into Recipient Identification of SMS-Based PhishingMax Clasen, Fudong Li 0001, David Williams. 148-163 [doi]
- Towards a Risk Assessment Matrix for Information Security WorkaroundsEugene Slabbert, Kerry-Lynn Thomson, Lynn Futcher. 164-178 [doi]
- A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud PentagonKeshnee Padayachee. 179-188 [doi]
- A Literature Review on Virtual Reality AuthenticationJohn M. Jones, Reyhan Duezguen, Peter Mayer, Melanie Volkamer, Sanchari Das. 189-198 [doi]
- Performance and Usability of Visual and Verbal Verification of Word-Based Key FingerprintsLee Livsey, Helen Petrie, Siamak F. Shahandashti, Aidan Fray. 199-210 [doi]
- The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing PasswordsPaul Brockbanks, Martin J. Butler. 211-222 [doi]