000 04256nam a22005895i 4500
001 978-3-030-81111-2
003 DE-He213
005 20240423125044.0
007 cr nn 008mamaa
008 210707s2021 sz | s |||| 0|eng d
020 _a9783030811112
_9978-3-030-81111-2
024 7 _a10.1007/978-3-030-81111-2
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aHuman Aspects of Information Security and Assurance
_h[electronic resource] :
_b15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings /
_cedited by Steven Furnell, Nathan Clarke.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aX, 223 p. 44 illus., 40 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v613
505 0 _aAttitudes and Perspectives -- Cyber Security in Healthcare Organisations -- Cybersecurity and digital exclusion of seniors: what do they fear? -- Exploring experiences of using SETA in Nordic municipalities -- Cyber Security Education -- SherLOCKED: A Detective-themed Serious Game for Cyber Security Education -- A Reference Point for Designing a Cybersecurity Curriculum for Universities -- A Conceptual Information Security Culture Framework for Higher Learning Institutions -- What can we learn from the analysis of information security policies: the case of UK’s schools -- A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity -- Evaluation strategies for cybersecurity training methods: a literature review -- People and Technology -- When Googling it doesn't work: The challenge of finding security advice for smart home devices -- Making Access Control Easy in IoT -- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation -- Friend or Foe: An investigation into recipient identification of SMS-based phishing -- Towards a Risk Assessment Matrix for Information Security Workarounds -- A Theoretical Underpinning for Examining Insider Attacks leveraging the Fraud Pentagon -- A Systematic Literature Review on Virtual Reality Authentication -- Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints -- The one-eyed leading the blind: Understanding differences between IT professionals and non-IT staff when creating and managing passwords.
520 _aThis book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021. The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.
650 0 _aApplication software.
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer and Information Systems Applications.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCryptology.
700 1 _aFurnell, Steven.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aClarke, Nathan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030811105
776 0 8 _iPrinted edition:
_z9783030811129
776 0 8 _iPrinted edition:
_z9783030811136
830 0 _aIFIP Advances in Information and Communication Technology,
_x1868-422X ;
_v613
856 4 0 _uhttps://doi.org/10.1007/978-3-030-81111-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c173719
_d173719