LEADER 05388nam 22007455 450 001 9910585768703321 005 20251225203755.0 010 $a3-031-12172-4 024 7 $a10.1007/978-3-031-12172-2 035 $a(MiAaPQ)EBC7048673 035 $a(Au-PeEL)EBL7048673 035 $a(CKB)24273938400041 035 $a(DE-He213)978-3-031-12172-2 035 $a(PPN)263897591 035 $a(EXLCZ)9924273938400041 100 $a20220721d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Aspects of Information Security and Assurance $e16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6?8, 2022, Proceedings /$fedited by Nathan Clarke, Steven Furnell 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (334 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v658 311 08$aPrint version: Clarke, Nathan Human Aspects of Information Security and Assurance Cham : Springer International Publishing AG,c2022 9783031121715 320 $aIncludes bibliographical references and index. 327 $aCyber Security Education & Training -- Visual Programming in Cyber Range Training to Improve Skill Development -- Survey of users? willingness to adopt and pay for cybersecurity training -- A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa -- Applying PDCA to Security, Education, Training and Awareness Programs -- Exploring CyBOK with Topic Modeling Techniques -- COLTRANE ? Towards a methodology and platform supported educational basis for cybersecurity education -- An investigation into educational process models for teaching secure programming -- Cybersecurity Knowledge Requirements for a Water Sector Employee -- CAP: Patching the Human Vulnerability -- A novel framework for the development of age appropriate information security serious games -- Cyber Security Culture -- Security Culture in Industrial Control Systems Organisations: A literature review -- Systematic review of factors that influence the cybersecurity culture -- Cyber4Dev Security Culture Model for African Countries -- A model for information security culture with innovation and creativity as enablers -- Understanding phishing in mobile instant messaging: A study into user behaviour toward shared links -- Privacy -- How privacy concerns impact Swedish citizens' willingness to report crimes -- Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why -- A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results -- Designing and Evaluating a Prototype for Data-related Privacy Controls in a Smart Home -- Cyber Security Management -- An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective -- Policy components - a conceptual model for tailoring information security policies -- Security fatigue: A case study of data specialists -- Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities -- Online security attack experience and worries of young adults in the United Kingdom -- PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator. 330 $aThis book constitutes the proceedings of the 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2022, held in Mytilene, Lesbos, Greece, in July 2022. The 25 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: cyber security education and training; cyber security culture; privacy; and cyber security management. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v658 606 $aApplication software 606 $aData protection 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputer networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aUser Interfaces and Human Computer Interaction 606 $aLegal Aspects of Computing 606 $aComputer Communication Networks 615 0$aApplication software. 615 0$aData protection. 615 0$aUser interfaces (Computer systems) 615 0$aHuman-computer interaction. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputer networks. 615 14$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aLegal Aspects of Computing. 615 24$aComputer Communication Networks. 676 $a004.6 702 $aFurnell$b Steven$f1970- 702 $aClarke$b Nathan 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910585768703321 996 $aHuman Aspects of Information Security and Assurance$92161895 997 $aUNINA