01234cam0 2200301 450 E60020003464020210712091209.0881502661420080219d1992 |||||ita|0103 baitaIT<<Il >>significato della negazione in KantMauro VisentinBolognail Mulino1992X, 579 p.24 cmIstituto italiano per gli studi storici35001SOBE000461992001 *Istituto italiano per gli studi storici35Visentin, MauroA600200046755070253920ITUNISOB20210712RICAUNISOBUNISOB900|Coll|38|K74070UNISOBFondo|De|Sanctis|F154592E600200034640M 102 Monografia moderna SBNM900|Coll|38|K000032Si74070massimoUNISOBUNISOB20080219084513.020210712091209.0rovitoFondo|De|Sanctis|F000048CON154592DeSanctisFdonoVmenleUNISOBUNISOB20111013110304.020210318082341.0SpinosaPer le modalità di consultazione vedi homepage della Biblioteca link FondiSignificato della negazione in Kant194443UNISOB05533nam 22007455 450 991098348750332120241127115238.09783031725593303172559X10.1007/978-3-031-72559-3(MiAaPQ)EBC31806677(Au-PeEL)EBL31806677(CKB)36685698400041(DE-He213)978-3-031-72559-3(EXLCZ)993668569840004120241127d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHuman Aspects of Information Security and Assurance 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9–11, 2024, Proceedings, Part I /edited by Nathan Clarke, Steven Furnell1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (379 pages)IFIP Advances in Information and Communication Technology,1868-422X ;7219783031725586 3031725581 -- Management & Risk. -- Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality. -- Information security behavioural threshold analysis: An application in the South African retail sector. -- Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists. -- A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats. -- Investigating the Factors Influencing Individuals’ Self-Sovereign Identity Adoption Intentions. -- "There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the Digital Age. -- A Profile-Based Cyber Security Readiness Assessment Framework at Country Level. -- To risk analyse, or not to risk analyse: That’s the question. -- Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review. -- Information Security Management in Digitized Identity Systems The Case of the Ghanaian National Identification Authority (NIA). -- Assessing Cyber Security Support for Small and Medium-Sized Enterprises. -- Social Engineering. -- A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks. -- Defining Measures of Effect for Disinformation Attacks. -- Phish and Tips:Phishing Awareness and Education for Older Adults. -- Literature Review: Misconceptions about Phishing. -- Technical Attacks & Defenses. -- Linux Kernel Keyloggers and Information Security. -- The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry. -- An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack. -- Research Agenda for Speaker Authentication. -- Usable Security. -- A Unified Privacy and Permission Management Framework. -- Understanding users’ mental models of Federated Identity Management (FIM): use of a new tangible elicitation method. -- Multi-factor authentication adoption: A comparison between digital natives and digital immigrants in Sweden. -- Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations. -- Assessing the Cybersecurity Needs and Experiences of Disabled Users.The two-volume set IFIP AICT 721 + 722 constitutes the proceedings of the 18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024, held in Skövde, Sweden, in July 9–11, 2024. The 39 full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections: Part I - Management and Risk; Social Engineering; Technical Attacks and Defenses; Usable Security. Part II - Awareness and Education; Privacy.IFIP Advances in Information and Communication Technology,1868-422X ;721Application softwareData protectionUser interfaces (Computer systems)Human-computer interactionComputersLaw and legislationInformation technologyLaw and legislationComputer networksComputer and Information Systems ApplicationsData and Information SecurityUser Interfaces and Human Computer InteractionLegal Aspects of ComputingComputer Communication NetworksApplication software.Data protection.User interfaces (Computer systems)Human-computer interaction.ComputersLaw and legislation.Information technologyLaw and legislation.Computer networks.Computer and Information Systems Applications.Data and Information Security.User Interfaces and Human Computer Interaction.Legal Aspects of Computing.Computer Communication Networks.005.3Clarke Nathan1380074Furnell Steven846860MiAaPQMiAaPQMiAaPQBOOK9910983487503321Human Aspects of Information Security and Assurance3421040UNINA