Human Aspects of Information Security and Assurance : 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9-11, 2024, Proceedings, Part I (Ifip Advances in Information and Communication Technology) (2024)

個数:

Human Aspects of Information Security and Assurance : 18th IFIP WG 11.12 International Symposium, HAISA 2024, Skövde, Sweden, July 9-11, 2024, Proceedings, Part I (Ifip Advances in Information and Communication Technology) (2024)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 372 p.
  • 商品コード 9783031725586

Full Description

The two-volume set IFIP AICT 721 + 722 constitutes the proceedings of the 18th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2024, held in Skövde, Sweden, in July 9-11, 2024.

The 39 full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections:

Part I - Management and Risk; Social Engineering; Technical Attacks and Defenses; Usable Security.

Part II - Awareness and Education; Privacy.

Contents

.- Management & Risk.

.- Employee Motivation in Organizational Cybersecurity: Matching Theory and Reality.

.- Information security behavioural threshold analysis: An application in the South African retail sector.

.- Scoping Review: The Landscape of Digital Risks and Cybersecurity Solutions for Journalists.

.- A Diary Study to Understand Young Saudi Adult Users' Experiences of Online Security Threats.

.- Investigating the Factors Influencing Individuals' Self-Sovereign Identity Adoption Intentions.

.- "There is a Damn Hello on the Social Media!" Insights into Public Risk Communication in the Digital Age.

.- A Profile-Based Cyber Security Readiness Assessment Framework at Country Level.

.- To risk analyse, or not to risk analyse: That's the question.

.- Information Security and Privacy Challenges Related to Personal eHealth Services - A Literature Review.

.- Information Security Management in Digitized Identity Systems The Case of the Ghanaian National Identification Authority (NIA).

.- Assessing Cyber Security Support for Small and Medium-Sized Enterprises.

.- Social Engineering.

.- A Systematic Task and Knowledge-Based Process to Tune Cybersecurity Training to User Learning Groups: Application to Email Phishing Attacks.

.- Defining Measures of Effect for Disinformation Attacks.

.- Phish and Tips:Phishing Awareness and Education for Older Adults.

.- Literature Review: Misconceptions about Phishing.

.- Technical Attacks & Defenses.

.- Linux Kernel Keyloggers and Information Security.

.- The Perceived Barriers to the Adoption of Blockchain in Addressing Cybersecurity Concerns in the Financial Services Industry.

.- An Interdisciplinary Thematic Analysis of the US National Guard Bureau Response to the SolarWinds Attack.

.- Research Agenda for Speaker Authentication.

.- Usable Security.

.- A Unified Privacy and Permission Management Framework.

.- Understanding users' mental models of Federated Identity Management (FIM): use of a new tangible elicitation method.

.- Multi-factor authentication adoption: A comparison between digital natives and digital immigrants in Sweden.

.- Discerning Challenges of Security Information and Event Management (SIEM) Systems in Large Organizations.

.- Assessing the Cybersecurity Needs and Experiences of Disabled Users.

最近チェックした商品