LEADER 06107nam 22006855 450 001 996465450903316 005 20200903195841.0 010 $a3-030-57404-0 024 7 $a10.1007/978-3-030-57404-8 035 $a(CKB)4100000011392507 035 $a(DE-He213)978-3-030-57404-8 035 $a(MiAaPQ)EBC6313876 035 $a(PPN)257360050 035 $a(EXLCZ)994100000011392507 100 $a20200903d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Aspects of Information Security and Assurance$b[electronic resource] $e14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8?10, 2020, Proceedings /$fedited by Nathan Clarke, Steven Furnell 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XI, 367 p. 51 illus., 30 illus. in color.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-4238 ;$v593 300 $aIncludes index. 311 $a3-030-57403-2 327 $aPrivacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees? Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users? Software Robustness -- Security Policy -- SMEs? Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- ?Most Companies Share Whatever They Can to Make Money!?: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ?Open Source Internet Research Tool?: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions. 330 $aThis book constitutes the proceedings of the 14th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-4238 ;$v593 606 $aApplication software 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer communication systems 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aApplication software. 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 0$aComputer communication systems. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aSystems and Data Security. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aClarke$b Nathan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465450903316 996 $aHuman Aspects of Information Security and Assurance$92161895 997 $aUNISA LEADER 04302nam 2200721 450 001 9910797660403321 005 20230808212213.0 010 $a0-8047-9638-6 024 7 $a10.1515/9780804796385 035 $a(CKB)3710000000477964 035 $a(EBL)4414741 035 $a(SSID)ssj0001556016 035 $a(PQKBManifestationID)16180220 035 $a(PQKBTitleCode)TC0001556016 035 $a(PQKBWorkID)13624420 035 $a(PQKB)10213650 035 $a(MiAaPQ)EBC4414741 035 $a(DE-B1597)563919 035 $a(DE-B1597)9780804796385 035 $a(Au-PeEL)EBL4414741 035 $a(CaPaEBR)ebr11176331 035 $a(OCoLC)921985842 035 $a(OCoLC)1198929669 035 $a(EXLCZ)993710000000477964 100 $a20150220h20162016 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aRebranding Islam $epiety, prosperity, and a self-help guru /$fJames Bourk Hoesterey 210 1$aStanford, California :$cStanford University Press,$d[2016] 210 4$dİ2016 215 $a1 online resource (293 p.) 225 1 $aStudies of the Walter H. Shorenstein Asia-Pacific Research Center 300 $aDescription based upon print version of record. 311 $a0-8047-9637-8 311 $a0-8047-9511-8 320 $aIncludes bibliographical references and index. 327 $aIntroduction : authority, subjectivity, and the cultural politics of public piety -- Branding Islam : autobiography, authenticity, and religious authority -- Enchanting science : popular psychology as religious wisdom -- Ethical entrepreneurs : Islamic ethics and the spirit of capitalism -- Prophetic cosmopolitanism : the Prophet Muhammad as psycho-civic exemplar -- Shaming the state : pornography and the moral psychology of statecraft -- Sincerity and scandal : the moral and market logics of religious authority -- Conclusion : figuring Islam : popular culture and the cutting edge of public piety. 330 $aKyai Haji Abdullah Gymnastiar, known affectionately by Indonesians as "Aa Gym" (elder brother Gym), rose to fame via nationally televised sermons, best-selling books, and corporate training seminars. In Rebranding Islam James B. Hoesterey draws on two years' study of this charismatic leader and his message of Sufi ideas blended with Western pop psychology and management theory to examine new trends in the religious and economic desires of an aspiring middle class, the political predicaments bridging self and state, and the broader themes of religious authority, economic globalization, and the end(s) of political Islam. At Gymnastiar's Islamic school, television studios, and MQ Training complex, Hoesterey observed this charismatic preacher developing a training regimen called Manajemen Qolbu into Indonesia's leading self-help program via nationally televised sermons, best-selling books, and corporate training seminars. Hoesterey's analysis explains how Gymnastiar articulated and mobilized Islamic idioms of ethics and affect as a way to offer self-help solutions for Indonesia's moral, economic, and political problems. Hoesterey then shows how, after Aa Gym's fall, the former celebrity guru was eclipsed by other television preachers in what is the ever-changing mosaic of Islam in Indonesia. Although Rebranding Islam tells the story of one man, it is also an anthropology of Islamic psychology. 410 0$aStudies of the Walter H. Shorenstein Asia-Pacific Research Center. 606 $aMuslim religious leaders$zIndonesia$vBiography 606 $aCelebrities$zIndonesia$vBiography 606 $aSelf-help techniques$xReligious aspects 606 $aMuslims$xReligious life$zIndonesia 606 $aIslam$xPsychology 607 $aIndonesia$xReligious life and customs 615 0$aMuslim religious leaders 615 0$aCelebrities 615 0$aSelf-help techniques$xReligious aspects. 615 0$aMuslims$xReligious life 615 0$aIslam$xPsychology. 676 $a297.4092 676 $aB 700 $aHoesterey$b James Bourk$f1975-$01565264 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910797660403321 996 $aRebranding Islam$93834768 997 $aUNINA