Human Aspects of Information Security and Assurance : 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Ifip Advances in Information and Communication Technology)

個数:

Human Aspects of Information Security and Assurance : 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Ifip Advances in Information and Communication Technology)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 223 p.
  • 商品コード 9783030811136

Full Description

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Contents

Attitudes and Perspectives.- Cyber Security in Healthcare Organisations.- Cybersecurity and digital exclusion of seniors: what do they fear?.- Exploring experiences of using SETA in Nordic municipalities.- Cyber Security Education.- SherLOCKED: A Detective-themed Serious Game for Cyber Security Education.- A Reference Point for Designing a Cybersecurity Curriculum for Universities.- A Conceptual Information Security Culture Framework for Higher Learning Institutions.- What can we learn from the analysis of information security policies: the case of UK's schools.- A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity.- Evaluation strategies for cybersecurity training methods: a literature review.- People and Technology.- When Googling it doesn't work: The challenge of finding security advice for smart home devices.- Making Access Control Easy in IoT.- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation.- Friend or Foe: An investigation into recipient identification of SMS-based phishing.- Towards a Risk Assessment Matrix for Information Security Workarounds.- A Theoretical Underpinning for Examining Insider Attacks leveraging the Fraud Pentagon.- A Systematic Literature Review on Virtual Reality Authentication.- Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints.- The one-eyed leading the blind: Understanding differences between IT professionals and non-IT staff when creating and managing passwords.

最近チェックした商品