Abstract is missing.
- Visual Programming in Cyber Range Training to Improve Skill DevelopmentMagdalena Glas, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, Günther Pernul. 3-13 [doi]
- Survey of Users' Willingness to Adopt and Pay for Cybersecurity TrainingJoakim Kävrestad, Martin Gellerstedt, Marcus Nohlberg, Jana Rambusch. 14-23 [doi]
- A Thematic Content Analysis of the Cybersecurity Skills Demand in South AfricaMadri Kruger, Lynn Futcher, Kerry-Lynn Thomson. 24-38 [doi]
- Applying PDCA to Security, Education, Training and Awareness ProgramsOlivier de Casanove, Nicolas Leleu, Florence Sèdes. 39-48 [doi]
- Exploring CyBOK with Topic Modeling TechniquesAna I. González-Tablas, Mohammed Rashed. 49-65 [doi]
- COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity EducationJerry Andriessen, Steven Furnell, Gregor Langner, Carmela Luciano, Gerald Quirchmayr, Vittorio Scarano, Teemu Johannes Tokola. 66-76 [doi]
- An Investigation into Educational Process Models for Teaching Secure ProgrammingVuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk. 77-90 [doi]
- Cybersecurity Knowledge Requirements for a Water Sector EmployeeR. Thomani, Annlizé Marnewick, Suné von Solms, Masike Malatji. 91-105 [doi]
- CAP: Patching the Human VulnerabilityThaddeus Eze, Neil Hawker. 106-119 [doi]
- A Novel Framework for the Development of Age Appropriate Information Security Serious GamesRudi Serfontein, Riana Serfontein. 120-129 [doi]
- Security Culture in Industrial Control Systems Organisations: A Literature ReviewStefanos Evripidou, Uchenna Daniel Ani, Jeremy D. McK. Watson, Stephen Hailes. 133-146 [doi]
- Systematic Review of Factors that Influence the Cybersecurity CultureEmilia N. Mwim, Jabu Mtsweni. 147-172 [doi]
- Cyber4Dev Security Culture Model for African CountriesVictor Reppoh, Adéle da Veiga. 173-185 [doi]
- A Model for Information Security Culture with Innovation and Creativity as EnablersAdéle da Veiga. 186-196 [doi]
- Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared LinksRufai Ahmad, Sotirios Terzis. 197-206 [doi]
- How Privacy Concerns Impact Swedish Citizens' Willingness to Report CrimesGunnar Lindqvist, Joakim Kävrestad. 209-217 [doi]
- "Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?"Anne Hennig, Heike Dietmann, Franz Lehr, Miriam Mutter, Melanie Volkamer, Peter Mayer. 218-227 [doi]
- A Survey of Australian Attitudes Towards Privacy: Some Preliminary ResultsLeah Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley. 228-239 [doi]
- Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart HomeChola Chhetri, Vivian Motti 0001. 240-250 [doi]
- An Exploratory Factor Analysis of Personality Factors: An Insider Threat PerspectiveKeshnee Padayachee. 253-264 [doi]
- Policy Components - A Conceptual Model for Tailoring Information Security PoliciesElham Rostami, Fredrik Karlsson 0001, Shang Gao 0002. 265-274 [doi]
- Security Fatigue: A Case Study of Data SpecialistsAnusha Bhana, Jacques Ophoff. 275-284 [doi]
- Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned EntitiesKarabo Pilane, Zainab Ruhwanya, Irwin Brown. 285-299 [doi]
- Online Security Attack Experience and Worries of Young Adults in the United KingdomNajla Aldaraani, Helen Petrie, Siamak F. Shahandashti. 300-309 [doi]
- PowerQoPE: A Personal Quality of Internet Protection and Experience ConfiguratorEnock Samuel Mbewe, Taveesh Sharma, Josiah Chavula. 310-327 [doi]