The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "HAISA"( http://dblp.L3S.de/Venues/HAISA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/haisa

Publication years (Num. hits)
2008-2009 (27) 2011-2012 (33) 2014 (21) 2015 (26) 2016 (28) 2017 (26) 2018 (25) 2019 (19) 2020 (28) 2021 (19) 2022 (26) 2023 (38)
Publication types (Num. hits)
inproceedings(302) proceedings(14)
Venues (Conferences, Journals, ...)
HAISA(316)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 316 publication records. Showing 316 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dirk Snyman, Hennie A. Kruger Behavioural Thresholds in the Context of Information Security. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Moufida Sadok, Peter M. Bednar Information Security Management in SMEs: Beyond the IT Challenges. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Lindokuhle Gcina Gomana, Lynn Ann Futcher, Kerry-Lynn Thomson An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Bahareh Shojaie, Hannes Federrath, Iman Saberi Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Jurjen Jansen, Paul van Schaik Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Esra Alkhamis, Karen Renaud The Design and Evaluation of an Interactive Social Engineering Training Programme. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Peter Mayer 0001, Stephan Neumann, Daniel Storck, Melanie Volkamer Supporting Decision Makers in Choosing Suitable Authentication Schemes. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Nathan L. Clarke, Steven Furnell (eds.) Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
1Teodor Sommestad, Henrik Karlzén, Peter Nilsson, Jonas Hallberg Perceived Information Security Risk as a Function of Probability and Severity. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Reza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee Managing Social Engineering Attacks- Considering Human Factors and Security Investment. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Adéle da Veiga An Information Security Training and Awareness Approach (ISTAAP) to Instil an Information Security-Positive Culture. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Hazel Webb, Nick Savage 0001, Peter Millard Arguments For Anonymity. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Malcolm R. Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Cate Jerram Examining Attitudes toward Information Security Behaviour using Mixed Methods. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Craig Thurlby, Caroline S. Langensiepen, John Haggerty, Robert Ranson Understanding User Knowledge of Computer Security and Risk: A Comparative Study. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Moufida Sadok, Peter M. Bednar Understanding Security Practices Deficiencies: A Contextual Analysis. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari Mismorphism: a Semiotic Model of Computer Security Circumvention. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Waldo Rocha Flores, Mathias Ekstedt Exploring the Link Between Behavioural Information Security Governance and Employee Information Security Awareness. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Joakim Kävrestad, Marcus Nohlberg Online Fraud Defence by Context Based Micro Training. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Abdullah Akmubark, Nobutoshi Hatanaka, Osamu Uchida, Yukiyo Ikeda Enlighten Information Morals through Corporate Culture. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Naume Sonhera, Elmarie Kritzinger, Marianne Loock Cyber Threat Incident Handling Procedure for South African Schools. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Shamal Faily, John McAlaney, Claudia Iacob Ethical Dilemmas and Dimensions in Penetration Testing. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Kirsi Helkala, Silje Knox, Mass Soldal Lund Effect of Motivation and Physical Fitness on Cyber Tasks. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Adéle da Veiga The Influence of Information Security Policies on Information Security Culture: Illustrated through a Case Study. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Timothy Kelley, Bennett I. Bertenthal Tracking Risky Behavior On The Web: Distinguishing Between What Users ‘Say' And ‘Do'. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Steven Furnell, Nathan L. Clarke (eds.) Ninth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Rayne Reid, Johan Van Niekerk A Cyber Security Culture Fostering Campaign through the Lens of Active Audience Theory. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Fredrik Karlsson 0001, Ella Kolkowska, Karin Hedström, Magnus Frostenson Inter-Organisational Information Sharing - Between a Rock and a Hard Place. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Jurjen Jansen Studying Safe Online Banking Behaviour: A Protection Motivation Theory Approach. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Noluxolo Gcaza, Rossouw von Solms, Joey Jansen van Vuuren An Ontology for a National Cyber-Security Culture Environment. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Miranda Kajtazi, Ella Kolkowska, Burcu Bulgurcu New Insights Into Understanding Manager's Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Neil McDonald, Shamal Faily, Marcella Favale, Christos Gatzidis Digital Rights Management: The Four Perspectives of Developers, Distributors, Users, and Lawyers. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Patrik Lif, Teodor Sommestad Human factors related to the performance of intrusion detection operators. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Nico Martins, Adéle da Veiga An Information Security Culture Model Validated with Structural Equation Modelling. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Liezel Cilliers, Stephen Flowerday The Relationship Between Privacy, Information Security and the Trustworthiness of a Crowdsourcing System in a Smart City. Search on Bibsonomy HAISA The full citation details ... 2015 DBLP  BibTeX  RDF
1Rayne Reid, Johan Van Niekerk Towards an Education Campaign for Fostering a Societal, Cyber Security Culture. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Nina Bär, Josef Krems Users can't be fooled - The role of existing vs. fictitious third party web assurance seals on websites. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Suné von Solms, Rossouw von Solms Towards Cyber Safety Education in Primary Schools in Africa. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Rika Butler, Martin J. Butler An assessment of the human factors affecting the password performance of South African online consumers. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Thomas Hughes-Roberts Privacy as a Secondary Goal Problem: An Experiment Examining Control. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Matina Tsavli, Pavlos S. Efraimidis, Vasilios Katos Reengineering the user: Privacy concerns about personal data on smartphones. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Kathryn Marie Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus Antanas Butavicius, Cate Jerram Using Actions and Intentions to Evaluate Categorical Responses to Phishing and Genuine Emails. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter Human Aspects of Information Assurance: A Questionnaire-based Quantitative Approach to Assessment. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Nalin Asanka Gamagedara Arachchilage, Andrew P. Martin A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Nathan L. Clarke, Steven Furnell (eds.) Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Karen Renaud, Rosanne English, Thomas Wynne, Florian Weber You Have Three Tries Before Lockout. Why Three?. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Moufida Sadok, Vasilios Katos, Peter M. Bednar Developing contextual understanding of information security risks. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Yolanda Mjikeliso, Johan Van Niekerk, Kerry-Lynn Thomson Exploring the Human Dimension in the Beneficiary Institutions of the SANReN Network. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Martin J. Butler, Rika Butler Improving internet banking security by using differentiated authentication based on risk profiling. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Hussain Alsaiari, Maria Papadaki, Paul Dowland 0001, Steven Furnell Alternative Graphical Authentication for Online Banking Environments. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Bukelwa Ngoqo, Stephen Flowerday Linking student information security awareness and behavioural intent. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Rosanne English Modelling the Security of Recognition-Based Graphical Passwords. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1André Lötter, Lynn Futcher A framework to assist email users in the identification of phishing attacks. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Shamal Faily Engaging Stakeholders in Security Design: An Assumption-Driven Approach. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Arne Renkema-Padmos, Jerome Baum, Melanie Volkamer, Karen Renaud Shake Hands to Bedevil: Securing Email with Wearable Technology. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Tite Tuyikeze, Stephen Flowerday Information Security Policy Development and Implementation: A Content Analysis Approach. Search on Bibsonomy HAISA The full citation details ... 2014 DBLP  BibTeX  RDF
1Paul Stephens An Evaluation of Linux Cybercrime Forensics Courses for European Law Enforcement. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Lynn Futcher, Rossouw von Solms SecSDM: A usable tool to support IT undergraduate students in secure software development. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Dimitrios Michalopoulos, Ioannis Mavridis Utilizing Survival Analysis for Modeling Child Hazards of Social Networking. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Donovan Isherwood, Marijke Coetzee, Jan H. P. Eloff Towards trust and reputation for e-commerce in collectivist rural Africa. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Alexandros Yeratziotis, Darelle van Greunen, Dalenca Pottas A Framework for Evaluating Usable Security: The Case of Online Health Social Networks . Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Aimilia Tasidou, Pavlos S. Efraimidis, Yannis Soupionis, Lilian Mitrou, Vasilios Katos User-centric, Privacy-Preserving Adaptation for VoIP CAPTCHA Challenges. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Evangelos D. Frangopoulos, Mariki M. Eloff, Lucas M. Venter Psychosocial Risks: can their effects on the Security of Information Systems really be ignored?. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Noluxolo Kortjan, Rossouw von Solms, Johan Van Niekerk Ethical Guidelines for Cyber-related Services Aimed at the Younger Generations. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Adeeb Alnajjar, Helge Janicke Multi-Factor Authentication Using Hardware Information and User Profiling Techniques. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Adnan Ahmad, Brian Whitworth, Lech J. Janczewski Dynamic Rights Reallocation In Social Networks. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Ken-ichi Hanamura, Toshihiko Takemura, Ayako Komatsu Analysis of Characteristics of Victims in Information Security Incidents: The Case of Japanese Internet Users. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Alexandra Maria Varka, Vasilios Katos On the user acceptance of graphical passwords. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Annette Sercombe, Maria Papadaki Education in the 'Virtual' Community: Can beating Malware Man teach users about Social Networking Security?. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Teodor Sommestad, Amund Hunstad Intrusion detection and the role of the system administrator. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Ronald Dodge, Costis Toregas, Lance J. Hoffman Cybersecurity Workforce Development Directions. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Francois Mouton, Mercia M. Malan, Hein S. Venter Development of Cognitive Functioning Psychological Measures for the SEADM. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Cristian Thiago Moecke, Melanie Volkamer Usable Secure Email Communications - Criteria and Evaluation of Existing Approaches. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Nathan L. Clarke, Steven Furnell (eds.) 6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Ayako Komatsu, Daisuke Takagi, Toshihiko Takemura Human Aspects of Information Security: An Empirical Study of Intentional versus Actual Behavior. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Omar Olivos Creating a Security Culture Development Plan and a case study. Search on Bibsonomy HAISA The full citation details ... 2012 DBLP  BibTeX  RDF
1Geoffrey Karokola, Stewart Kowalski, Louise Yngström Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Geordie Stewart, David Lacey Death by a Thousand Facts: Criticising the Technocratic Approach to Information Security Awareness. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Steven Furnell, Nathan L. Clarke (eds.) 5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Zarul Fitri Zaaba, Steven Furnell, Paul Dowland 0001 End-User Perception and Usability of Information Security. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Kerry-Lynn Thomson, Johan Van Niekerk Combating Information Security Apathy By Encouraging Prosocial Organisational Behaviour. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Moses Dlamini, Mariki M. Eloff, Jan H. P. Eloff, Hein S. Venter A Budget Model for Information Security. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Julio Angulo, Simone Fischer-Hübner, Tobias Pulls, Erik Wästlund Towards Usable Privacy Policy Display & Management - The PrimeLife Approach. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Luke Hebbes, Chris Chan 2-Factor Authentication with 2D Barcodes. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Eva Söderström, Rose-Mharie Åhlfeldt, Nomie Eriksson Trusting digitized patient-related information: The need for a new approach. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Muhammad Arif What Matters Most Among Human Factors to Comply With Organisation's Information Security Policy?. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Malcolm R. Pattinson, Cate Jerram, Kathryn Parsons, Agata McCormac, Marcus A. Butavicius Managing Phishing Emails: A Scenario-Based Experiment. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Tatsuo Asai The Influence of Religion and Gender on Information Security Problems in Cross-Cultural Environments. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Andreas Reichard, Gerald Quirchmayr, Christopher C. Wills Challenges in Implementing Information Security Policies. Search on Bibsonomy HAISA The full citation details ... 2011 DBLP  BibTeX  RDF
1Tara Whalen, Carrie Gates Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Mohd Zalisham Jali, Steven Furnell, Paul Dowland 0001 Evaluating Web-Based User Authentication using Graphical Techniques. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Benjamin George Sanders, Paul Dowland 0001, Steven Furnell An Assessment of People's Vulnerabilities in Relation to Personal & Sensitive Data. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Steven Furnell, Nathan L. Clarke (eds.) 3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Shirley Atkinson, Steven Furnell, Andrew D. Phippen Risk Culture Influences in Internet Safety and Security. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1David Lacey Understanding and Transforming Organisational Culture. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Janne Merete Hagen, Pål Spilling Do organizational security measures contribute to the detection and reporting of IT-system abuses?. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Elaine Hulitt, Rayford B. Vaughn Information System Security Compliance to FISMA Standard: A Quantitative Measure. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Liska Waluyan, Sirikpudee Sasipan, Stephanie Noguera, Tatsuo Asai Analysis of Potential Problems in People Management concerning Information Security in Cross-cultural Environment -In the Case of Malaysia- . Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
1Christopher Bolan, Peter Hannay Freegate: A Defence against the Pending Censorship of Australia?. Search on Bibsonomy HAISA The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #201 - #300 of 316 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license