Abstract is missing.
- Combating Digital Exclusion with Cybersecurity Training - An Interview Study with Swedish SeniorsJoakim Kävrestad, David Lindvall, Marcus Nohlberg. 3-12 [doi]
- Another Look at Cybersecurity Awareness ProgramsSebastiaan H. von Solms, Jaco du Toit, Elmarie Kritzinger. 13-23 [doi]
- Cyber Range Exercises: Potentials and Open Challenges for OrganizationsMagdalena Glas, Fabian Böhm, Falko Schönteich, Günther Pernul. 24-35 [doi]
- An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity CurriculaMuwei Zheng, Nathan Swearingen, William Silva, Matt Bishop, Xukai Zou. 36-52 [doi]
- Cybersecurity Training Acceptance: A Literature ReviewJoakim Kävrestad, Wesam Fallatah, Steven Furnell. 53-63 [doi]
- Cyber Security Awareness and Education Support for Home and Hybrid WorkersFayez Alotaibi, Steven Furnell, Ying He. 64-75 [doi]
- On-Campus Hands-On Ethical Hacking Course - Design, Deployment and Lessons LearnedLeonardo A. Martucci, Jonathan Magnusson, Mahdi Akil. 76-90 [doi]
- Planning for Professional Development in Cybersecurity: A New Curriculum DesignEliana Stavrou. 91-104 [doi]
- A Comprehensive Design Framework for Multi-disciplinary Cyber Security EducationGregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik. 105-115 [doi]
- Key Elements for Cybersafety Education of Primary School Learners in South AfricaLynn Futcher, Kerry-Lynn Thomson, Lean Kucherera, Noluxolo Gcaza. 116-128 [doi]
- Factors Associated with Cybersecurity Culture: A Quantitative Study of Public E-health Hospitalsin South AfricaEmilia N. Mwim, Jabu Mtsweni, Bester Chimbo. 129-142 [doi]
- Towards a Framework for the Personalization of Cybersecurity AwarenessSaud Alotaibi, Steven Furnell, Y. He. 143-153 [doi]
- A Qualitative Content Analysis of Actionable Advice in Swedish Public Agencies' Information Security PoliciesElham Rostami, Fredrik Karlsson 0001. 157-168 [doi]
- Business Language for Information SecurityDinh Uy Tran, Audun Jøsang. 169-180 [doi]
- "Check, Check, Check, We Got Those" - Catalogue Use in Information Security Risk ManagementErik Bergström, Martin Lundgren, Karin Bernsmed, Guillaume Bour. 181-191 [doi]
- Proposed Guidelines for Website Data Privacy Policies and an Application ThereofArmand Vorster, Adéle da Veiga. 192-210 [doi]
- Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)Tebogo Kesetse Lejaka, Adéle da Veiga, Marianne Loock. 211-224 [doi]
- Is Your CISO Burnt Out yet? - Examining Demographic Differences in Workplace Burnout Amongst Cyber Security ProfessionalsAndrew Reeves, Malcolm R. Pattinson, Marcus A. Butavicius. 225-236 [doi]
- An Investigation into the Cybersecurity Skills Gap in South AfricaMichael de Jager, Lynn Futcher, Kerry-Lynn Thomson. 237-248 [doi]
- Cybersecurity-Related Behavior of Personnel in the Norwegian IndustryKristian Kannelønning, Sokratis Katsikas. 249-258 [doi]
- It's More Than Just Money: The Real-World Harms from Ransomware AttacksNandita Pattnaik, Jason R. C. Nurse, Sarah Turner, Gareth Mott, Jamie MacColl, Pia Huesch, James Sullivan. 261-274 [doi]
- Cyberthreats in Modern Cars: Responsibility and Readiness of Auto WorkshopsDavid Hedberg, Martin Lundgren, Marcus Nohlberg. 275-284 [doi]
- Decreasing Physical Access Bottlenecks through Context-Driven AuthenticationKhutso Lebea, Wai Sze Leung. 285-295 [doi]
- Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy PerspectiveUrvashi Kishnani, Srinidhi Madabhushi, Sanchari Das. 296-309 [doi]
- Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender's AddressDaniel G. Conway, Marcus A. Butavicius, Kun Yu, Fang Chen 0001. 310-323 [doi]
- Content Analysis of Persuasion Principles in Mobile Instant Message PhishingRufai Ahmad, Sotirios Terzis, Karen Renaud. 324-336 [doi]
- Six-Year Study of Emails Sent to Unverified AddressesAlexander Joukov, Nikolai Joukov. 337-345 [doi]
- Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity ThreatsFai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell. 349-363 [doi]
- Online Security Attack Experience and Worries of Young Adults in the Kingdom of Saudi ArabiaNajla Aldaraani, Helen Petrie, Siamak F. Shahandashti. 364-376 [doi]
- To Catch a Thief: Examining Socio-technical Variables and Developing a Pathway Framework for IP Theft Insider AttacksMonica T. Whitty, Christopher Ruddy, David A. Keatley. 377-390 [doi]
- Analyzing Cybersecurity Definitions for Non-expertsLorenzo Neil, Julie M. Haney, Kerrianne Buchanan, Charlotte Healy. 391-404 [doi]
- On using the Task Models for Validation and Evolution of Usable Security Design PatternsCélia Martinie, Bilal Naqvi. 405-417 [doi]
- Chatbots: A Framework for Improving Information Security Behaviours using ChatGPTTapiwa Gundu. 418-431 [doi]
- Factors Influencing Internet of Medical Things (IoMT) Cybersecurity Protective Behaviours Among Healthcare WorkersSinazo Brown, Zainab Ruhwanya, Ayanda Pekane. 432-444 [doi]
- The Influence of Interpersonal Factors on Telecommuting Employees' Cybercrime Preventative Behaviours During the PandemicTim Wright, Zainab Ruhwanya, Jacques Ophoff. 445-458 [doi]
- A Review of Constructive Alignment in Information Security Educational ResearchVuyolwethu Sizoli Mdunyelwa, Lynn Futcher, Johan Van Niekerk. 461-469 [doi]
- What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security ResearchMarcus Gerdin, Åke Grönlund, Ella Kolkowska. 470-481 [doi]