In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
![]() | Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)Steven Furnell, Nathan Clarke (Ed.) ![]() |
- Tailoring Policies and Involving Users in Constructing Security Policies – A Mapping Study
Elham Rostami
pp1-11
- Using the IKEA Effect to Improve Information Security Policy Compliance
Omar Olivos
pp12-19
- Holistic Information Security Management for Home Environments
Fayez Alotaibi, Nathan Luke Clarke, Steven Furnell
pp20-33
- A Machine Learning Approach to Detect Insider Threats in Emails Caused by Human Behaviours
Anotnia Michael, Jan Eloff
pp34-49
- Public Understanding of Cyber Security and Digital Forensics within the UK
Georgina Humphries, Joseph Williams
pp50-60
- Killing Your Device via Your USB Port
Olga Angelopoulou, Seyedali Pourmoafi, Andrew Jones, Gaurav Sharma
pp61-72
- Privacy Enhancing Technology Awareness for Mobile Devices
Aziz Alshehri, Nathan Luke Clarke, Fudong Li
pp73-88
- Public Thoughts on Tackling Digital Crime in Society and by Law Enforcement
Georgina Humphries
pp89-98
- Critical Aspects Pertaining to Privacy Preservation of IoT Architecture
Mohamed Sarrab, Fatma Alshohoumi
pp99-109
- Cybersecurity Awareness and Culture in Rural Norway
Håkon Gunleifsen, Vasileios Gkioulos, Gaute Wangen, Andrii Shalaginov, Mazaher Kianpour, Mohamed Abomhara
pp110-121
- Users perception of using CBMT for information security training
Joakim Kävrestad, Marie Skärgård, Marcus Nohlberg
pp122-131
- Aligning Cyber-Security Training to Individual Cognitive Style
Malcolm Pattinson, Jane Sweeney, Marcus Butavicius, Andrew Reeves, Kathryn Parsons, Agata McCormac, Dragana Calic
pp132-142
- MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
Sanchari Das, Bingxi Wang, Linda Jean Camp
pp143-154
- Analysing the Usage of Character Groups and Keyboard Patterns in Password
Joakim Kävrestad, Johan Zaxmy, Marcus Nohlberg
pp155-165
- Evaluating User Perception of Multi-Factor Authentication: A Systematic Review
Sanchari Das, Bingxi Wang, Zachary Tingle, Linda Jean Camp
pp166-178
- Phishing Attack Recognition by End-Users: Concepts for URL Visualization and Implementation
Vivian Ives Philipp Erbenich, Daniel Träder, Andreas Heinemann, Meltem Nural
pp179-188
- All About Phishing: Exploring User Research through a Systematic Literature Review
Sanchari Das, Andrew Kim, Zachary Tingle, Christena Nippert-Eng
pp189-202
- A Hypothesised Model to Examine Susceptibility to Cyber-Social Engineering Through LinkedIn in The Workplace
Mohammed Khaled N Alotaibi
pp203-214