Filters








35 Hits in 3.0 sec

End-User Perception and Usability of Information Security

Zarul Fitri Zaaba, Steven Furnell, Paul Dowland
2011 International Symposium on Human Aspects of Information Security and Assurance  
Furthermore, evidence suggests there is a corresponding need for a novel approach to improve perception and usability of information security.  ...  Respondents were presented with a range of questions designed to measure their experience and knowledge of security.  ...  of the Fifth International Symposium on Human Aspects of Information Security & Assurance(HAISA 2011)  ... 
dblp:conf/haisa/ZaabaFD11 fatcat:sfgsq5a4ifayrjrbrafmrviosy

Cybersecurity Workforce Development Directions

Ronald Dodge, Costis Toregas, Lance J. Hoffman
2012 International Symposium on Human Aspects of Information Security and Assurance  
The systems supporting the information technology requirements of the world's government, power, and financial systems are interconnected more than any other system in the world.  ...  Despite the criticality and interconnectivity of these systems, the workforce has developed without a concentrated and standard view of its requirements.  ...  Department of Homeland Security under Grant Award Number 2006-CS-001-000001, under the auspices of the Institute for Information Infrastructure Protection (I3P) Any opinions, findings, and conclusions  ... 
dblp:conf/haisa/DodgeTH12 fatcat:mjx2rs5um5cbbaczgmj3xwawly

Dynamic Rights Reallocation In Social Networks

Adnan Ahmad, Brian Whitworth, Lech J. Janczewski
2012 International Symposium on Human Aspects of Information Security and Assurance  
It suggests a theoretical base for access control beyond its security parent.  ...  A socio-technical approach based on social and technical requirements can give the basics of a model. Various rights reallocations like multiply, divide, transfer and delegate are explored.  ...  Table 1 : Allocating use and meta-rights 1 Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance(HAISA 2012) Allocated by (Actor) Allocated to (Actor) Meta  ... 
dblp:conf/haisa/AhmadWJ12 fatcat:vejfrs4wrncvtn2dbj6olgzb5q

Alternative Graphical Authentication for Online Banking Environments

Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell
2014 International Symposium on Human Aspects of Information Security and Assurance  
The result showed that many online banking users had multiple accounts and found carrying around several security tokens is inconvenient.  ...  The use of a hardware security token to generate the required OTP has been widespread.  ...  Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014) 133 Table 7 illustrates a breakdown of the hybrid scheme characteristics.  ... 
dblp:conf/haisa/AlsaiariPDF14 fatcat:khqpxo2cr5atvctxv4xilnbawy

Elicitation of Requirements for an Inter-Organizational Platform to Support Security Management Decisions

Julian Dax, Benedikt Ley, Sebastian Pape, Christopher Schmitz, Volkmar Pipek, Kai Rannenberg
2016 International Symposium on Human Aspects of Information Security and Assurance  
The focus of this work is not on technical innovation but on how existing technologies and best practices can be adopted for the needs of small and mediumsized energy providers.  ...  Due to new regulations in Germany energy providers are required to obtain IT security certificates. Especially small and medium-sized energy providers struggle to fulfill these new requirements.  ...  This research was developed in the context of the project SIDATE which is funded by the German Federal Ministry of Education and Research (BMBF) within its funding priority "IT Security for Critical Infrastructures  ... 
dblp:conf/haisa/DaxLPSPR16 fatcat:wbj3wvqiw5fjhcu2t6drmd6ohm

The Influence of Data Protection Regulation on the Information Security Culture of an Organisation-A Case Study Comparing Legislation and Offices across Jurisdictions

A Da Veiga
2017 Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance   unpublished
The information security culture of an organisation is influenced by various factors, of which one could be related to legal and regulatory requirements.  ...  of security.  ...  Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance(HAISA 2017)  ... 
fatcat:hqf7pkqcwzey3k5toylklzifwi

A Broad Empirical Study of IT Security Practioners

Konstantin Beznosov
2008 Zenodo  
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after  ...  To date, there is little empirical evidence about how human, organizational, and technological factors impact the processes of managing IT security.  ...  Risk Perception Technological Factors Organizational Factors Human Factors Vulnerabilities R. of the Symposium on Human Aspects in Information Security and Assurance (HAISA), Plymouth, UK,  ... 
doi:10.5281/zenodo.3264314 fatcat:nzd5omqd3ferdh575lebwa7amu

Why (Managing) IT Security is Hard and Some Ideas for Making It Easier

Konstantin Beznosov
2008 Zenodo  
I discuss recent developments at the Laboratory for Education and Research in Secure Systems Engineering (LERSSE), University of British Columbia.  ...  I will specifically talk about - an ongoing study of how IT security is managed in today organizations, and what makes it challenging, - improving availability of authorization subsystems in large-scale  ...  Beznosov, "Identifying Security Professionals' Needs: a Qualitative Analysis", to appear in the Proceedings of the Symposium on Human Aspects in Information Security and Assurance (HAISA), Plymouth, UK  ... 
doi:10.5281/zenodo.3264332 fatcat:eqaiylacirhi3padj7er4zgxwi

HOT Admin Research Project: Overview and Results to Date

Konstantin Beznosov
2008 Zenodo  
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after  ...  To date, there is little empirical evidence about how human, organizational, and technological factors impact the processes of managing IT security.  ...  Beznosov, "Identifying Security Professionals' Needs: a Qualitative Analysis", submitted to the Symposium on Human Aspects in Information Security and Assurance (HAISA) 2008. 28 Theme: Challenges  ... 
doi:10.5281/zenodo.3264312 fatcat:4siwo4irlfefjpe7wokqm4uuwu

Toward Understanding the Workplace of IT Security Practitioners

Konstantin Beznosov
2008 Zenodo  
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after  ...  To date, there is little empirical evidence about how human, organizational, and technological factors impact the processes of managing IT security.  ...  Beznosov, "Identifying Security Professionals' Needs: a Qualitative Analysis", to appear in the Proceedings of the Symposium on Human Aspects in Information Security and Assurance (HAISA), Plymouth, UK  ... 
doi:10.5281/zenodo.3264328 fatcat:tyb3ddqwdnbmhepe32azfy4iua

On the imbalance of the security problem space and its expected consequences

Konstantin Beznosov, Olga Beznosova, Steven Furnell
2007 Information Management & Computer Security  
The decomposition of the problem space into technological, human, and social factors enabled us to analyze the concentration of public research efforts by defenders.  ...  Yet attackers seem to employ more and more human and social factors in their attacks.  ...  Acknowledgments The authors would like to thank anonymous reviewers for their constructive and helpful comments, Lee Iverson for feedback on an earlier version of this paper, and Craig Wilson for improving  ... 
doi:10.1108/09685220710831152 fatcat:5ka4qawnq5gxrdwem4gpkvgxce

Shake Hands To Bedevil: Securing Email With Wearable Technology

Arne Renkema-Padmos, Jerome Baum, Karen Renaud, Melanie Volkamer
2014 Zenodo  
This pairing can be used to make the exchange of secure emails between the wearers easier.  ...  Issues around the human-device interface, user acceptance, feasibility, and deployment are discussed, but need further work.  ...  Acknowledgements We would like to thank the anonymous reviewers of TEI 2014 and HAISA 2014.  ... 
doi:10.5281/zenodo.11163 fatcat:5bnzmlzog5al3l25whbrtydnym

Management of IT Security in Organizations: What Makes It Hard?

Konstantin Beznosov
2008 Zenodo  
Security of information technology (IT) has become a critical issue for organizations as they must protect their information assets from unauthorized access and quickly resume business activities after  ...  To date, there is little empirical evidence about how human, organizational, and technological factors impact the processes of managing IT security.  ...  Beznosov, "Identifying Security Professionals' Needs: a Qualitative Analysis", to appear in the Proceedings of the Symposium on Human Aspects in Information Security and Assurance (HAISA), Plymouth,  ... 
doi:10.5281/zenodo.3264337 fatcat:apcwfpdkiffexiqkk3nifmjrvq

Workshop des Arbeitskreises "Usable Security & Privacy" – Ziele, Themen, Ausblick [article]

Hartmut Schmitt, Luigi Lo Iacono, Sascha Wagner
2016 Mensch & Computer  
Der Arbeitskreis Usable Security & Privacy bietet ein Forum für den Gedankenaustausch und die interdisziplinäre Zusammenarbeit rund um das Thema benutzerfreundliche Informationssicherheit und privatheitsfördernde  ...  Im Workshop werden mit den Teilnehmern Beispiele diskutiert und es wird gemeinsam ein Stimmungsbild zum Verständnis, zum Stellenwert und zum aktuellen Grad der Umsetzung von Usable Security & Privacy erhoben  ...  B. das "Symposium On Usable Privacy and Security" (SOUPS), das "International Symposium on Human Aspects of Information Security & Assurance" (HAISA), die "International Conference on Human Aspects of  ... 
doi:10.18420/muc2016-up-0012 dblp:conf/mc/SchmittIW16 fatcat:qji3rbyczfdc5pi6ffwj6yorwq

Editorial for Security and Privacy in Wireless Networks Special Issue

Muttukrishnan Rajarajan, Steven Furnell
2013 Journal on spesial topics in mobile networks and applications  
This can be characterised as bootstrapping a secure connection using human trust. This provides new challenges to the formal modelling of trust and authentication.  ...  In the third paper, "Adaptive Information Coding for Secure and Reliable Wireless Telesurgery", a Telesurgical Robot System (TRS) is studied and the authors present a novel approach that uses information  ...  He is also the editor-in-chief of Information Management & Computer Security, and the co-chair of the Human Aspects of Information Security & Assurance (HAISA) symposium (www.haisa.org).  ... 
doi:10.1007/s11036-013-0471-x fatcat:ynzlka6ntzhwziuvjyrg3sou6y
« Previous Showing results 1 — 15 out of 35 results