LEADER 06046nam 22007335 450 001 9911047817903321 005 20251029120442.0 010 $a9783032025043$b(electronic bk.) 010 $z9783032025036 024 7 $a10.1007/978-3-032-02504-3 035 $a(MiAaPQ)EBC32383136 035 $a(Au-PeEL)EBL32383136 035 $a(CKB)41986547500041 035 $a(DE-He213)978-3-032-02504-3 035 $a(OCoLC)1549518005 035 $a(EXLCZ)9941986547500041 100 $a20251029d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Aspects of Information Security and Assurance $e19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7?9, 2025, Proceedings /$fedited by Steven Furnell, Nathan Clarke 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (627 pages) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v761 311 08$aPrint version: Furnell, Steven Human Aspects of Information Security and Assurance Cham : Springer,c2025 9783032025036 327 $a -- Awareness & Education. -- Thematic Analysis of Cybersecurity Awareness Strategies and Approaches. -- Investigating Cyber-Situational Awareness for Cyber Ranges in Offshore Operations. -- ?I?m in? ? Portrayal of Hacking in Movies and TV Shows. -- Cybersecurity and emerging technologies: Investigating individuals? ability to identify deepfake media. -- Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study. -- Transmission, Evaluation, Culture? Internal Communications as a Catalyst for Information Security Awareness. -- Theoretical Underpinnings for Consideration in the Design of a Secure Programming Course. -- Cybersecurity Vulnerabilities of Female Learners: The Case of South African Marginalised School. -- Supporting cyber security knowledge and skills in non-computing disciplines. -- Multidisciplinary Pathways into Cyber Threat Intelligence Roles: Mapping Knowledge Areas and Transferable Skills. -- Security Culture. -- How Digital Evidence Seizure Times Affect Swedish Citizens? Willingness to Report Crimes. -- A Cyber4Dev Security Culture Model for SMMEs in South Africa. -- Reimagining AI as a Psychosocial Buffer: A Conceptual Model for Mitigating Burnout and Quiet Quitting in Cybersecurity. -- Factors Contributing to Cybersecurity Fatigue. -- Increasing a Product?s Perceived Cybersecurity by Indicating the Country of Origin. -- Privacy. -- Digital Coercive Control: Towards Understanding Item Finder Misuse. -- ?Of course, that?s not feasible for everyone? ? Compiling and Evaluating Privacy Recommendations in Expert Interviews. -- A Holistic Profile for the Information Privacy Aware and Competent User. -- Reducing Role Ambiguity for Organisational Data Privacy Compliance. -- Security and Privacy Implications of AI-Driven Digital Phenotyping. -- Adopting LLMs in Internet of Cloud Ecosystems: Identifying the Key Privacy Challenges. -- Public Perceptions of Trustworthy AI: Insights from a Longitudinal Study of UK News Media. -- Technical Attacks & Defenses. -- Beyond phishing: A human-centered exploration of cyber incident reporting. -- Words matter: Applying the Elaboration Likelihood Model to Examine the persuasive cues evident in True and Fake News about the ?Indigenous Voice to Parliament?. -- A Structured Approach to Log Design: Addressing Security and Compliance Gaps in Software Development. -- A Literature Review on Rule-Based Systems as Decision Support Systems. -- Online Authentication for Users with Visual Disabilities. -- SoK: A Systematic Review of Context- and Behavior-Aware Adaptive Authentication in Mobile Environments. -- On the Inconsistency of Update-Related Vulnerabilities. -- Cybersecurity Strategies to Mitigate Insider Threats in Multi-Cloud Environments. 330 $aThis volume constitutes the proceedings of the 19th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2025, held in Mytilene, Greece, during July 7?9, 2025. The 30 full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in the following topical sections: Awareness & Education; Security Culture; Privacy and Technical Attacks & Defenses. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v761 606 $aApplication software 606 $aData protection 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputer networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aUser Interfaces and Human Computer Interaction 606 $aLegal Aspects of Computing 606 $aComputer Communication Networks 615 0$aApplication software. 615 0$aData protection. 615 0$aUser interfaces (Computer systems) 615 0$aHuman-computer interaction. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputer networks. 615 14$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aLegal Aspects of Computing. 615 24$aComputer Communication Networks. 676 $a005.3 700 $aFurnell$b Steven$0846860 701 $aClarke$b Nathan$01380074 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9911047817903321 996 $aHuman Aspects of Information Security and Assurance$93421040 997 $aUNINA