top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Human aspects of information security and assurance : 16th IFIP WG 11.12 international symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022 : proceedings / / edited by Nathan Clarke and Steven Furnell
Human aspects of information security and assurance : 16th IFIP WG 11.12 international symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022 : proceedings / / edited by Nathan Clarke and Steven Furnell
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (334 pages)
Disciplina 004.6
Collana IFIP Advances in Information and Communication Technology Ser.
Soggetto topico Computer networks - Security measures
Computer security
ISBN 3-031-12172-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cyber Security Education and Training -- Visual Programming in Cyber Range Training to Improve Skill Development -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Integrating a VPL into Cyber Range Training -- 4.1 Cyber Range Concept -- 4.2 SIEM Rule Creation with Blockly -- 5 Evaluation -- 5.1 Method and Procedure -- 5.2 Results and Discussion -- 6 Conclusion -- References -- Survey of Users' Willingness to Adopt and Pay for Cybersecurity Training -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Discussion -- 4.1 Answering the Research Questions -- 4.2 Contributions -- 4.3 Limitations and Future Work -- References -- A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa -- 1 Introduction -- 2 Related Literature -- 3 Thematic Content Analysis Using ATLAS.ti -- 3.1 First Phase: Pre-analysis -- 3.2 Second Phase: Material Exploration -- 3.3 Third Phase: Interpretation -- 4 General Results and Findings -- 4.1 Identified Industries -- 4.2 Job Locations -- 4.3 Job Levels -- 4.4 Qualifications and Certifications -- 5 Job Roles Results and Findings -- 5.1 Identified Job Roles, Knowledge, Skills and Abilities -- 5.2 Mapping of Identified Skills and Abilities to Job Categories -- 6 Discussion and Implications -- 7 Conclusion -- References -- Applying PDCA to Security, Education, Training and Awareness Programs -- 1 Introduction -- 2 Plan the SETA Program -- 2.1 The Source -- 2.2 The Type of Message -- 2.3 The Media -- 2.4 The Target -- 3 Do the SETA Program -- 4 Check the SETA Program -- 5 Adjust the SETA Program -- 6 Discussion and Perspectives -- 7 Conclusion -- References -- Exploring CyBOK with Topic Modeling Techniques -- 1 Introduction -- 2 Related Work -- 2.1 Topic Modeling -- 2.2 Cyber Security Frameworks -- 2.3 Text Mining in Cyber Security.
3 Materials and Methods -- 3.1 BERTopic -- 3.2 Corpus Generation -- 3.3 Topic Modeling with BERTopic -- 4 Results -- 4.1 Topic Model Analysis -- 4.2 Topic Model vs CyBOK Chapters -- 5 Discussion -- 5.1 Topic Model Analysis -- 5.2 Topic Model vs CyBOK Chapters -- 5.3 Possible Expansions -- 5.4 Limitations -- 6 Conclusion -- 6.1 Future Work -- References -- COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education -- 1 Introduction -- 2 COLTRANE Methodology -- 3 A Pilot Study -- 4 Outlook and Conclusion -- References -- An Investigation into Educational Process Models for Teaching Secure Programming -- 1 Introduction -- 2 Research Methodology -- 3 Secure Programming Education and Training -- 4 Educational Process Models -- 5 Thematic Content Analysis of Educational Process Models -- 5.1 Inputs -- 5.2 Integration (Combination) -- 5.3 Output -- 5.4 Reflection -- 6 Educational Process Model Elements for Teaching Secure Programming -- 6.1 Inputs for Teaching Secure Programming -- 6.2 Integration for Teaching Secure Programming -- 6.3 Outputs for Teaching Secure Programming -- 6.4 Reflection -- 7 Conclusion -- References -- Cybersecurity Knowledge Requirements for a Water Sector Employee -- 1 Introduction -- 2 Research Methodology -- 3 Planning the Review -- 3.1 Identifying the Need for a Review -- 3.2 Development of a Review Protocol -- 4 Conducting the Review -- 4.1 Searching the Literature -- 4.2 Screening for Inclusion and Exclusion -- 4.3 Data Extraction -- 4.4 Screening for Eligibility -- 4.5 Quality Assessment -- 5 Data Analysis and Synthesis -- 5.1 Familiarisation with the Data -- 5.2 Generating Initial Codes -- 5.3 Searching for Themes -- 5.4 Reviewing the Themes -- 5.5 Reporting on Findings -- 5.6 Framework for Defining the Cybersecurity Knowledge -- 6 Conclusion -- 6.1 Limitations and Future Research.
References -- CAP: Patching the Human Vulnerability -- 1 Introduction -- 2 Literature Review -- 2.1 Existing Cyber Security Awareness and Training -- 2.2 Related Studies -- 2.3 Assessing and Measuring Skills -- 3 CAP Design -- 4 CAP Implementation and Analysis -- 4.1 CAP - User Viewpoint and Admin Configuration -- 4.2 Testing, Results, and Analysis -- 5 Conclusion -- References -- A Novel Framework for the Development of Age Appropriate Information Security Serious Games -- 1 Introduction -- 2 Background -- 2.1 Erikson's Stages of Psychosocial Development -- 2.2 Bandura's Social Cognitive Theory -- 2.3 Information Security Serious Games -- 3 Method -- 4 Framework Evaluation -- 4.1 3rdStage: 3-6 Years Old -- 4.2 4thStage: 6 Years Old to Adolescence, and 5thStage: Adolescence -- 5 Conclusion and Future Work -- References -- Cyber Security Culture -- Security Culture in Industrial Control Systems Organisations: A Literature Review -- 1 Introduction -- 2 Background on Security Culture -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Systematic Review of Factors that Influence the Cybersecurity Culture -- 1 Introduction -- 2 Research Aims -- 3 Background -- 4 Information Security and Cybersecurity -- 5 Research Method -- 5.1 Data Sources and Selection Criteria -- 5.2 Results -- 5.3 Cybersecurity Culture Factors -- 6 Discussion and Contribution -- 7 Limitations and Future Work -- 8 Conclusion -- Appendix -- References -- Cyber4Dev Security Culture Model for African Countries -- 1 Introduction -- 2 Research Problem and Research Questions -- 3 Background -- 3.1 Defining Information Security Culture and Cyber4Dev Security Culture -- 3.2 Cyber Security Challenges in Africa -- 3.3 Cyber Awareness in Africa -- 3.4 Why Promote a Cyber4Dev Security Culture? -- 4 Research Method -- 4.1 Information Sources -- 4.2 Eligibility Criteria.
4.3 Data Collection -- 5 Results -- 5.1 Synthesis of the Results -- 5.2 The African Perspective -- 6 Cyber4Dev Security Culture Model -- 7 Conclusion and Future Work -- References -- A Model for Information Security Culture with Innovation and Creativity as Enablers -- 1 Introduction -- 2 Background -- 2.1 Information Security Culture -- 2.2 Creativity and Innovation in an Organisation -- 2.3 Applying Creativity and Innovation in Information Security Culture -- 3 Research Methodology -- 4 Results -- 4.1 Creativity and Innovation in the Information Security Culture Context -- 4.2 Creativity and Innovation in an Organisational Culture Context -- 4.3 Conceptual Model -- 5 Conclusion and Future Work -- References -- Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Links -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 5 Discussion and Limitations -- 6 Conclusions -- References -- Privacy -- How Privacy Concerns Impact Swedish Citizens' Willingness to Report Crimes -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Analysis of the Results -- 3.2 Discussion of the Results -- 4 Conclusions -- References -- ``Your Cookie Disclaimer is Not in Line with the Ideas of the GDPR. Why?'' -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Methodology -- 4.1 Design Decisions for Communication -- 4.2 Procedure -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results -- 1 Introduction -- 2 Related Work -- 3 Method -- 4 Results and Discussion -- 4.1 Trust -- 4.2 Behaviour -- 4.3 Control -- 4.4 Awareness and Knowledge -- 5 The COVID-19 Effect -- 6 Conclusion -- References -- Designing and Evaluating a Prototype for Data-Related Privacy Controls in a Smart Home -- 1 Introduction -- 2 Background.
2.1 Privacy Control Design Factors and Sub-factors -- 2.2 Translating Privacy Control Design Factors into Design -- 3 Method -- 3.1 Stimulus (Prototype App) -- 3.2 Pre-study -- 3.3 Interview Study -- 3.4 Survey Study -- 4 Results -- 4.1 Task Accuracy -- 4.2 User Experience -- 4.3 Usability -- 4.4 Perceived Information Control -- 4.5 User Satisfaction -- 4.6 Behavioral Intention to Use -- 4.7 User Feedback -- 5 Discussion -- 5.1 Design Recommendations -- 5.2 Limitations and Future Work -- 6 Conclusion -- References -- Cyber Security Management -- An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective -- 1 Introduction -- 2 Related Work -- 3 Theoretical Framing -- 4 Research Methodology -- 5 Data Analysis -- 6 Discussion of Findings -- 7 Implications for Theory and Practice -- 8 Conclusions -- Appendix A: Rotated Factor Loading -- References -- Policy Components - A Conceptual Model for Tailoring Information Security Policies -- 1 Introduction -- 2 Related Research -- 3 Research Method -- 4 Policy Component - Conceptual Model -- 5 Policy Component - Demonstration -- 5.1 Policy Component: Managing E-mails -- 5.2 Two Tailored Information Security Policies -- 6 Conclusion and Future Research -- References -- Security Fatigue: A Case Study of Data Specialists -- 1 Introduction -- 2 Literature Review -- 2.1 Security Complexity and Fatigue -- 2.2 Managing Security Fatigue -- 3 Research Design -- 3.1 Case Organisation and Participants -- 3.2 Data Collection and Analysis -- 4 Analysis and Findings -- 4.1 Awareness of Risks -- 4.2 Influence of Compliance Effort -- 4.3 Influence of Psychological Stress -- 4.4 Adequacy of Knowledge -- 5 Conclusion -- References -- Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities -- 1 Introduction -- 2 Conceptual Background and Hypotheses Development.
2.1 Perceptions of Law Enforcement Agencies.
Record Nr. UNISA-996483161203316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Human Aspects of Information Security and Assurance : 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings / / edited by Nathan Clarke, Steven Furnell
Human Aspects of Information Security and Assurance : 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings / / edited by Nathan Clarke, Steven Furnell
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (334 pages)
Disciplina 004.6
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Application software
Data protection
User interfaces (Computer systems)
Human-computer interaction
Computers - Law and legislation
Information technology - Law and legislation
Computer networks
Computer and Information Systems Applications
Data and Information Security
User Interfaces and Human Computer Interaction
Legal Aspects of Computing
Computer Communication Networks
Xarxes d'ordinadors
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-12172-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Education & Training -- Visual Programming in Cyber Range Training to Improve Skill Development -- Survey of users’ willingness to adopt and pay for cybersecurity training -- A Thematic Content Analysis of the Cybersecurity Skills Demand in South Africa -- Applying PDCA to Security, Education, Training and Awareness Programs -- Exploring CyBOK with Topic Modeling Techniques -- COLTRANE – Towards a methodology and platform supported educational basis for cybersecurity education -- An investigation into educational process models for teaching secure programming -- Cybersecurity Knowledge Requirements for a Water Sector Employee -- CAP: Patching the Human Vulnerability -- A novel framework for the development of age appropriate information security serious games -- Cyber Security Culture -- Security Culture in Industrial Control Systems Organisations: A literature review -- Systematic review of factors that influence the cybersecurity culture -- Cyber4Dev Security Culture Model for African Countries -- A model for information security culture with innovation and creativity as enablers -- Understanding phishing in mobile instant messaging: A study into user behaviour toward shared links -- Privacy -- How privacy concerns impact Swedish citizens' willingness to report crimes -- Your Cookie Disclaimer is not in line with the ideas of the GDPR. Why -- A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results -- Designing and Evaluating a Prototype for Data-related Privacy Controls in a Smart Home -- Cyber Security Management -- An Exploratory Factor Analysis of Personality Factors: An Insider Threat Perspective -- Policy components - a conceptual model for tailoring information security policies -- Security fatigue: A case study of data specialists -- Factors Influencing Cybercrime Reporting Behaviour in South African State-Owned Entities -- Online security attack experience and worries of young adults in the United Kingdom -- PowerQoPE: A Personal Quality of Internet Protection and Experience Configurator.
Record Nr. UNINA-9910585768703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human aspects of information security and assurance : 15th IFIP WG 11.12 international symposium, HAISA 2021, virtual event, July 7-9, 2021 : proceedings / / Steven Furnell and Nathan Clarke (editors)
Human aspects of information security and assurance : 15th IFIP WG 11.12 international symposium, HAISA 2021, virtual event, July 7-9, 2021 : proceedings / / Steven Furnell and Nathan Clarke (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (229 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Application software
Computer networks - Security measures
ISBN 3-030-81111-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Attitudes and Perspectives -- Cyber Security in Healthcare Organisations -- 1 Introduction -- 1.1 Research Aim -- 2 Literature Review -- 3 Research Method -- 3.1 Description of Goal Attainment Scaling (GAS) -- 3.2 Phase 1: Development of the GAS Evaluation Instrument -- 3.3 Phase 2: Use the GAS Evaluation Instrument -- 3.4 Phase 3: Analyse the Evaluation Results and Report to Management -- 4 Results -- 5 Limitations and Future Research -- 6 Conclusions -- References -- Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? -- 1 Introduction -- 2 Research Approach -- 3 Results and Analysis -- 3.1 Fear of Doing Wrong -- 3.2 Fear of New Technology -- 3.3 Fear of Being Conned -- 3.4 Shame -- 4 Discussion and Conclusion -- References -- Exploring Experiences of Using SETA in Nordic Municipalities -- 1 Introduction -- 2 Research Approach -- 3 Results and Analysis -- 4 Discussion and Conclusion -- References -- Cyber Security Education -- SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education -- 1 Introduction -- 2 Literature Review -- 3 SherLOCKED: A Detective-Themed Serious Game for Security Education -- 3.1 Game Context -- 3.2 The Game -- 4 User Study and Discussion -- 4.1 Study Design -- 4.2 Results and Discussion -- 5 Conclusion and Future Work -- References -- A Reference Point for Designing a Cybersecurity Curriculum for Universities -- 1 Introduction -- 2 Research Aims -- 3 Background -- 4 Research Methodology -- 4.1 Research Method -- 4.2 Academic Publications Defining Cybersecurity Curricula -- 4.3 Results -- 4.4 Cybersecurity Curricula of Universities -- 4.5 Best Practice and Industry Frameworks for Cybersecurity Curricula -- 5 Reference Point for a Cybersecurity Curriculum -- 6 Conclusion -- References.
A Conceptual Information Security Culture Framework for Higher Learning Institutions -- 1 Introduction -- 2 Research Aim and Question -- 3 Background -- 3.1 Understanding Information Security Culture -- 3.2 Organisational Culture and Information Security Culture -- 4 Cultivating Information Security Culture in Universities -- 5 Scoping Literature Review -- 5.1 Results of Scoping Literature Review -- 5.2 Factors for Cultivating Information Security Culture -- 5.3 Literature Gaps Identified -- 6 A Conceptual Information Security Culture Framework -- 6.1 The STOPE View -- 6.2 The Relationship of STOPE Components -- 6.3 Schein's Concept of Organisational Culture -- 7 The InfoSeCulF -- 8 Limitations and Future Research -- 9 Conclusion -- References -- What Can We Learn from the Analysis of Information Security Policies? The Case of UK's Schools -- 1 Introduction -- 2 Background -- 3 Data Collection and Analysis -- 3.1 Content of ISPs -- 3.2 Accessibility -- 3.3 Updating of ISPs -- 4 Discussion and Conclusions -- References -- A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children -- 1 Introduction -- 2 Cybersecurity -- 3 Cybersecurity Awareness for Pre-school Children -- 3.1 Example Resources from Literature -- 3.2 Play as a Mode of Awareness and Knowledge Acquisition -- 4 Serious Games for Pre-school Children -- 5 Serious Game Implementation -- 6 Reflection -- 7 Conclusion and Future Work -- References -- Evaluation Strategies for Cybersecurity Training Methods: A Literature Review -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Initial Categorization of Included Papers -- 3.2 Identification of Evaluation Methods -- 3.3 Analysis of Evaluation Methods -- 3.4 Discussion on the Results -- 4 Conclusions -- References -- People and Technology.
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 4.1 Sources of Information -- 4.2 Reported Threats -- 4.3 Types of Advice Needed and Provided -- 5 Discussion -- 6 Limitations and Future Work -- 7 Conclusions -- References -- Making Access Control Easy in IoT -- 1 Introduction -- 2 The MUD Standard -- 3 Related Work -- 4 Method -- 5 Results -- 6 Conclusions -- References -- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation -- 1 Introduction -- 2 Related Work -- 3 Cybersecurity Roles, Subject Disciplines, and Knowledge Areas Mapping -- 4 Investigations -- 4.1 Results -- 5 Conclusions and Future Directions -- References -- Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing -- 1 Introduction -- 2 Literature Review -- 2.1 Phishing Techniques and Tactics -- 2.2 External Factors -- 2.3 Summary -- 3 Methodology -- 3.1 Data Collection -- 4 Survey Findings -- 4.1 Phishing Messages -- 4.2 Genuine Messages -- 4.3 Analysis of External Factors -- 5 Conclusion -- Appendix -- References -- Towards a Risk Assessment Matrix for Information Security Workarounds -- 1 Introduction -- 2 Information Security Risk Assessment -- 3 Workarounds Defined -- 4 Factors that Influence Workarounds -- 4.1 The Employee Decision-Making Process -- 4.2 Environmental Factors -- 5 Alter's Theory of Workarounds -- 6 Workaround Classification and Risk Assessment -- 7 Conclusion -- References -- A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon -- 1 Introduction -- 2 Related Work -- 3 A Theoretical Underpinning for Insider Attacks -- 4 Implications for Practice -- 5 Conclusion -- References -- A Literature Review on Virtual Reality Authentication -- 1 Introduction.
2 Methods -- 3 Findings -- 3.1 Types of Authentication -- 3.2 Security Evaluation of Proposed Authentication Protocols -- 3.3 User Studies -- 4 Discussions and Implications -- 5 Conclusion -- References -- Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints -- 1 Introduction -- 2 Background and Related Work -- 3 Method -- 3.1 Design -- 3.2 Participants -- 3.3 Materials and Task -- 3.4 Procedure -- 4 Results -- 4.1 Performance: Task Completion Time and Errors -- 4.2 Perceived Usability and Related Concepts -- 4.3 Effect of Preferred Information Style: Verbal Versus Visual -- 5 Discussion and Conclusions -- References -- The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords -- 1 Introduction -- 2 Prior Research -- 2.1 User Generated Passwords -- 2.2 Defining and Categorizing Password Practices -- 2.3 Unsafe Passwords Creation and Management Practices -- 3 Research Problem and Objectives -- 4 Research Methods -- 5 Research Results -- 5.1 Descriptive Analysis -- 5.2 Inferential Analysis -- 6 Managerial Implications and Recommendations -- 7 Limitations and Future Research -- References -- Author Index.
Record Nr. UNISA-996464487303316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Human aspects of information security and assurance : 15th IFIP WG 11.12 international symposium, HAISA 2021, virtual event, July 7-9, 2021 : proceedings / / Steven Furnell and Nathan Clarke (editors)
Human aspects of information security and assurance : 15th IFIP WG 11.12 international symposium, HAISA 2021, virtual event, July 7-9, 2021 : proceedings / / Steven Furnell and Nathan Clarke (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (229 pages)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Application software
Computer networks - Security measures
ISBN 3-030-81111-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Attitudes and Perspectives -- Cyber Security in Healthcare Organisations -- 1 Introduction -- 1.1 Research Aim -- 2 Literature Review -- 3 Research Method -- 3.1 Description of Goal Attainment Scaling (GAS) -- 3.2 Phase 1: Development of the GAS Evaluation Instrument -- 3.3 Phase 2: Use the GAS Evaluation Instrument -- 3.4 Phase 3: Analyse the Evaluation Results and Report to Management -- 4 Results -- 5 Limitations and Future Research -- 6 Conclusions -- References -- Cybersecurity and Digital Exclusion of Seniors: What Do They Fear? -- 1 Introduction -- 2 Research Approach -- 3 Results and Analysis -- 3.1 Fear of Doing Wrong -- 3.2 Fear of New Technology -- 3.3 Fear of Being Conned -- 3.4 Shame -- 4 Discussion and Conclusion -- References -- Exploring Experiences of Using SETA in Nordic Municipalities -- 1 Introduction -- 2 Research Approach -- 3 Results and Analysis -- 4 Discussion and Conclusion -- References -- Cyber Security Education -- SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education -- 1 Introduction -- 2 Literature Review -- 3 SherLOCKED: A Detective-Themed Serious Game for Security Education -- 3.1 Game Context -- 3.2 The Game -- 4 User Study and Discussion -- 4.1 Study Design -- 4.2 Results and Discussion -- 5 Conclusion and Future Work -- References -- A Reference Point for Designing a Cybersecurity Curriculum for Universities -- 1 Introduction -- 2 Research Aims -- 3 Background -- 4 Research Methodology -- 4.1 Research Method -- 4.2 Academic Publications Defining Cybersecurity Curricula -- 4.3 Results -- 4.4 Cybersecurity Curricula of Universities -- 4.5 Best Practice and Industry Frameworks for Cybersecurity Curricula -- 5 Reference Point for a Cybersecurity Curriculum -- 6 Conclusion -- References.
A Conceptual Information Security Culture Framework for Higher Learning Institutions -- 1 Introduction -- 2 Research Aim and Question -- 3 Background -- 3.1 Understanding Information Security Culture -- 3.2 Organisational Culture and Information Security Culture -- 4 Cultivating Information Security Culture in Universities -- 5 Scoping Literature Review -- 5.1 Results of Scoping Literature Review -- 5.2 Factors for Cultivating Information Security Culture -- 5.3 Literature Gaps Identified -- 6 A Conceptual Information Security Culture Framework -- 6.1 The STOPE View -- 6.2 The Relationship of STOPE Components -- 6.3 Schein's Concept of Organisational Culture -- 7 The InfoSeCulF -- 8 Limitations and Future Research -- 9 Conclusion -- References -- What Can We Learn from the Analysis of Information Security Policies? The Case of UK's Schools -- 1 Introduction -- 2 Background -- 3 Data Collection and Analysis -- 3.1 Content of ISPs -- 3.2 Accessibility -- 3.3 Updating of ISPs -- 4 Discussion and Conclusions -- References -- A Wolf, Hyena, and Fox Game to Raise Cybersecurity Awareness Among Pre-school Children -- 1 Introduction -- 2 Cybersecurity -- 3 Cybersecurity Awareness for Pre-school Children -- 3.1 Example Resources from Literature -- 3.2 Play as a Mode of Awareness and Knowledge Acquisition -- 4 Serious Games for Pre-school Children -- 5 Serious Game Implementation -- 6 Reflection -- 7 Conclusion and Future Work -- References -- Evaluation Strategies for Cybersecurity Training Methods: A Literature Review -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Initial Categorization of Included Papers -- 3.2 Identification of Evaluation Methods -- 3.3 Analysis of Evaluation Methods -- 3.4 Discussion on the Results -- 4 Conclusions -- References -- People and Technology.
When Googling It Doesn't Work: The Challenge of Finding Security Advice for Smart Home Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 4.1 Sources of Information -- 4.2 Reported Threats -- 4.3 Types of Advice Needed and Provided -- 5 Discussion -- 6 Limitations and Future Work -- 7 Conclusions -- References -- Making Access Control Easy in IoT -- 1 Introduction -- 2 The MUD Standard -- 3 Related Work -- 4 Method -- 5 Results -- 6 Conclusions -- References -- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation -- 1 Introduction -- 2 Related Work -- 3 Cybersecurity Roles, Subject Disciplines, and Knowledge Areas Mapping -- 4 Investigations -- 4.1 Results -- 5 Conclusions and Future Directions -- References -- Friend or Foe: An Investigation into Recipient Identification of SMS-Based Phishing -- 1 Introduction -- 2 Literature Review -- 2.1 Phishing Techniques and Tactics -- 2.2 External Factors -- 2.3 Summary -- 3 Methodology -- 3.1 Data Collection -- 4 Survey Findings -- 4.1 Phishing Messages -- 4.2 Genuine Messages -- 4.3 Analysis of External Factors -- 5 Conclusion -- Appendix -- References -- Towards a Risk Assessment Matrix for Information Security Workarounds -- 1 Introduction -- 2 Information Security Risk Assessment -- 3 Workarounds Defined -- 4 Factors that Influence Workarounds -- 4.1 The Employee Decision-Making Process -- 4.2 Environmental Factors -- 5 Alter's Theory of Workarounds -- 6 Workaround Classification and Risk Assessment -- 7 Conclusion -- References -- A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon -- 1 Introduction -- 2 Related Work -- 3 A Theoretical Underpinning for Insider Attacks -- 4 Implications for Practice -- 5 Conclusion -- References -- A Literature Review on Virtual Reality Authentication -- 1 Introduction.
2 Methods -- 3 Findings -- 3.1 Types of Authentication -- 3.2 Security Evaluation of Proposed Authentication Protocols -- 3.3 User Studies -- 4 Discussions and Implications -- 5 Conclusion -- References -- Performance and Usability of Visual and Verbal Verification of Word-Based Key Fingerprints -- 1 Introduction -- 2 Background and Related Work -- 3 Method -- 3.1 Design -- 3.2 Participants -- 3.3 Materials and Task -- 3.4 Procedure -- 4 Results -- 4.1 Performance: Task Completion Time and Errors -- 4.2 Perceived Usability and Related Concepts -- 4.3 Effect of Preferred Information Style: Verbal Versus Visual -- 5 Discussion and Conclusions -- References -- The One-Eyed Leading the Blind: Understanding Differences Between IT Professionals and Non-IT Staff When Creating and Managing Passwords -- 1 Introduction -- 2 Prior Research -- 2.1 User Generated Passwords -- 2.2 Defining and Categorizing Password Practices -- 2.3 Unsafe Passwords Creation and Management Practices -- 3 Research Problem and Objectives -- 4 Research Methods -- 5 Research Results -- 5.1 Descriptive Analysis -- 5.2 Inferential Analysis -- 6 Managerial Implications and Recommendations -- 7 Limitations and Future Research -- References -- Author Index.
Record Nr. UNINA-9910491023603321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human Aspects of Information Security and Assurance / / guest editors: Nathan Clarke and Steven Furnell
Human Aspects of Information Security and Assurance / / guest editors: Nathan Clarke and Steven Furnell
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Descrizione fisica 1 online resource (125 pages)
Disciplina 005.8
Collana Information and computer security
Soggetto topico Computer networks - Security measures
ISBN 1-80382-130-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910795673303321
[Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human Aspects of Information Security and Assurance / / guest editors: Nathan Clarke and Steven Furnell
Human Aspects of Information Security and Assurance / / guest editors: Nathan Clarke and Steven Furnell
Pubbl/distr/stampa [Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Descrizione fisica 1 online resource (125 pages)
Disciplina 005.8
Collana Information and computer security
Soggetto topico Computer networks - Security measures
ISBN 1-80382-130-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910816599803321
[Place of publication not identified] : , : Emerald Publishing Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information systems security and privacy : 6th international conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers / / edited by Steven Furnell, [and three others]
Information systems security and privacy : 6th international conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers / / edited by Steven Furnell, [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (256 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Software engineering
ISBN 3-030-94900-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464535903316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers / / edited by Steven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp
Information Systems Security and Privacy : 6th International Conference, ICISSP 2020, Valletta, Malta, February 25–27, 2020, Revised Selected Papers / / edited by Steven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (256 pages)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer engineering
Computer networks
Software engineering
Data and Information Security
Cryptology
Mobile and Network Security
Computer Engineering and Networks
Security Services
Software Engineering
ISBN 3-030-94900-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Inferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet DetectionSystems.
Record Nr. UNINA-9910523714403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
Pubbl/distr/stampa Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017]
Descrizione fisica 1 online resource (334 pages) : illustrations
Disciplina 005.4/46
Collana CRC Series in Security, Privacy and Trust
Soggetto topico Mobile communication systems - Security measures
Smartphones - Security measures
ISBN 1-315-36964-8
1-4987-3592-4
1-315-35263-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security.
Record Nr. UNINA-9910153184703321
Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing information and communications systems : principles, technologies, and applications / / Steven M. Furnell [and others], editors
Securing information and communications systems : principles, technologies, and applications / / Steven M. Furnell [and others], editors
Pubbl/distr/stampa Boston : , : Artech House, , ©2008
Descrizione fisica 1 online resource (376 p.)
Disciplina 005.8
Altri autori (Persone) FurnellSteven <1970->
Collana Artech House information security and privacy series
Soggetto topico Computer networks - Security measures
Computer security
Data encryption (Computer science)
Soggetto genere / forma Electronic books.
ISBN 1-59693-229-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security concepts, services, and threats -- Business-integrated information security management -- User authentication technologies -- Authorization and access control -- Data-centric applications -- Modern cryptology -- Network security -- Standard public key and privilege management infrastructures -- Smart cards and tokens -- Privacy and privacy-enhancing technologies -- Content filtering technologies and the law -- Model for cybercrime investigations -- Systemic-holistic approach to ICT security -- Electronic voting systems -- On mobile wiki systems security.
Record Nr. UNINA-9910455453103321
Boston : , : Artech House, , ©2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui