06046nam 22007335 450 991104781790332120251029120442.09783032025043(electronic bk.)978303202503610.1007/978-3-032-02504-3(MiAaPQ)EBC32383136(Au-PeEL)EBL32383136(CKB)41986547500041(DE-He213)978-3-032-02504-3(OCoLC)1549518005(EXLCZ)994198654750004120251029d2026 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHuman Aspects of Information Security and Assurance 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings /edited by Steven Furnell, Nathan Clarke1st ed. 2026.Cham :Springer Nature Switzerland :Imprint: Springer,2026.1 online resource (627 pages)IFIP Advances in Information and Communication Technology,1868-422X ;761Print version: Furnell, Steven Human Aspects of Information Security and Assurance Cham : Springer,c2025 9783032025036 -- Awareness & Education. -- Thematic Analysis of Cybersecurity Awareness Strategies and Approaches. -- Investigating Cyber-Situational Awareness for Cyber Ranges in Offshore Operations. -- “I’m in” – Portrayal of Hacking in Movies and TV Shows. -- Cybersecurity and emerging technologies: Investigating individuals’ ability to identify deepfake media. -- Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study. -- Transmission, Evaluation, Culture– Internal Communications as a Catalyst for Information Security Awareness. -- Theoretical Underpinnings for Consideration in the Design of a Secure Programming Course. -- Cybersecurity Vulnerabilities of Female Learners: The Case of South African Marginalised School. -- Supporting cyber security knowledge and skills in non-computing disciplines. -- Multidisciplinary Pathways into Cyber Threat Intelligence Roles: Mapping Knowledge Areas and Transferable Skills. -- Security Culture. -- How Digital Evidence Seizure Times Affect Swedish Citizens’ Willingness to Report Crimes. -- A Cyber4Dev Security Culture Model for SMMEs in South Africa. -- Reimagining AI as a Psychosocial Buffer: A Conceptual Model for Mitigating Burnout and Quiet Quitting in Cybersecurity. -- Factors Contributing to Cybersecurity Fatigue. -- Increasing a Product’s Perceived Cybersecurity by Indicating the Country of Origin. -- Privacy. -- Digital Coercive Control: Towards Understanding Item Finder Misuse. -- “Of course, that’s not feasible for everyone” – Compiling and Evaluating Privacy Recommendations in Expert Interviews. -- A Holistic Profile for the Information Privacy Aware and Competent User. -- Reducing Role Ambiguity for Organisational Data Privacy Compliance. -- Security and Privacy Implications of AI-Driven Digital Phenotyping. -- Adopting LLMs in Internet of Cloud Ecosystems: Identifying the Key Privacy Challenges. -- Public Perceptions of Trustworthy AI: Insights from a Longitudinal Study of UK News Media. -- Technical Attacks & Defenses. -- Beyond phishing: A human-centered exploration of cyber incident reporting. -- Words matter: Applying the Elaboration Likelihood Model to Examine the persuasive cues evident in True and Fake News about the ‘Indigenous Voice to Parliament’. -- A Structured Approach to Log Design: Addressing Security and Compliance Gaps in Software Development. -- A Literature Review on Rule-Based Systems as Decision Support Systems. -- Online Authentication for Users with Visual Disabilities. -- SoK: A Systematic Review of Context- and Behavior-Aware Adaptive Authentication in Mobile Environments. -- On the Inconsistency of Update-Related Vulnerabilities. -- Cybersecurity Strategies to Mitigate Insider Threats in Multi-Cloud Environments.This volume constitutes the proceedings of the 19th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2025, held in Mytilene, Greece, during July 7–9, 2025. The 30 full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in the following topical sections: Awareness & Education; Security Culture; Privacy and Technical Attacks & Defenses.IFIP Advances in Information and Communication Technology,1868-422X ;761Application softwareData protectionUser interfaces (Computer systems)Human-computer interactionComputersLaw and legislationInformation technologyLaw and legislationComputer networksComputer and Information Systems ApplicationsData and Information SecurityUser Interfaces and Human Computer InteractionLegal Aspects of ComputingComputer Communication NetworksApplication software.Data protection.User interfaces (Computer systems)Human-computer interaction.ComputersLaw and legislation.Information technologyLaw and legislation.Computer networks.Computer and Information Systems Applications.Data and Information Security.User Interfaces and Human Computer Interaction.Legal Aspects of Computing.Computer Communication Networks.005.3Furnell Steven846860Clarke Nathan1380074MiAaPQMiAaPQMiAaPQ9911047817903321Human Aspects of Information Security and Assurance3421040UNINA