LEADER 06107nam 22006855 450 001 996465450903316 005 20200903195841.0 010 $a3-030-57404-0 024 7 $a10.1007/978-3-030-57404-8 035 $a(CKB)4100000011392507 035 $a(DE-He213)978-3-030-57404-8 035 $a(MiAaPQ)EBC6313876 035 $a(PPN)257360050 035 $a(EXLCZ)994100000011392507 100 $a20200903d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Aspects of Information Security and Assurance$b[electronic resource] $e14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8?10, 2020, Proceedings /$fedited by Nathan Clarke, Steven Furnell 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XI, 367 p. 51 illus., 30 illus. in color.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-4238 ;$v593 300 $aIncludes index. 311 $a3-030-57403-2 327 $aPrivacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees? Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users? Software Robustness -- Security Policy -- SMEs? Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- ?Most Companies Share Whatever They Can to Make Money!?: Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the ?Open Source Internet Research Tool?: A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions. 330 $aThis book constitutes the proceedings of the 14th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-4238 ;$v593 606 $aApplication software 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer communication systems 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aApplication software. 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 0$aComputer communication systems. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aSystems and Data Security. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aClarke$b Nathan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465450903316 996 $aHuman Aspects of Information Security and Assurance$92161895 997 $aUNISA