Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
Neuigkeiten Dienstag 18. November 2025: Die Lesesäle der Deutschen Nationalbibliothek in Frankfurt am Main öffnen wegen einer Personalversammlung erst ab 13 Uhr. // Tuesday 18 November 2025: The reading rooms of the German National Library in Frankfurt am Main will open at 13:00 due to a staff assembly.
 
Neuigkeiten Mittwoch, 19. November 2025: Die Deutsche Nationalbibliothek in Leipzig ist geschlossen.
 
 

Ergebnis der Suche nach: cod="ro"



Treffer 227 von 4512875 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1380285410
Titel Human Aspects of Information Security and Assurance : 19th IFIP WG 11.12 International Symposium, HAISA 2025, Mytilene, Greece, July 7–9, 2025, Proceedings / edited by Steven Furnell, Nathan Clarke
Person(en) Furnell, Steven (Herausgeber)
Clarke, Nathan L. (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XI, 452 p. 72 illus., 47 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-032-02503-6
Printed edition:: ISBN: 978-3-032-02505-0
Printed edition:: ISBN: 978-3-032-02506-7
Inhalt -- Awareness & Education. -- Thematic Analysis of Cybersecurity Awareness Strategies and Approaches. -- Investigating Cyber-Situational Awareness for Cyber Ranges in Offshore Operations. -- “I’m in” – Portrayal of Hacking in Movies and TV Shows. -- Cybersecurity and emerging technologies: Investigating individuals’ ability to identify deepfake media. -- Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study. -- Transmission, Evaluation, Culture– Internal Communications as a Catalyst for Information Security Awareness. -- Theoretical Underpinnings for Consideration in the Design of a Secure Programming Course. -- Cybersecurity Vulnerabilities of Female Learners: The Case of South African Marginalised School. -- Supporting cyber security knowledge and skills in non-computing disciplines. -- Multidisciplinary Pathways into Cyber Threat Intelligence Roles: Mapping Knowledge Areas and Transferable Skills. -- Security Culture. -- How Digital Evidence Seizure Times Affect Swedish Citizens’ Willingness to Report Crimes. -- A Cyber4Dev Security Culture Model for SMMEs in South Africa. -- Reimagining AI as a Psychosocial Buffer: A Conceptual Model for Mitigating Burnout and Quiet Quitting in Cybersecurity. -- Factors Contributing to Cybersecurity Fatigue. -- Increasing a Product’s Perceived Cybersecurity by Indicating the Country of Origin. -- Privacy. -- Digital Coercive Control: Towards Understanding Item Finder Misuse. -- “Of course, that’s not feasible for everyone” – Compiling and Evaluating Privacy Recommendations in Expert Interviews. -- A Holistic Profile for the Information Privacy Aware and Competent User. -- Reducing Role Ambiguity for Organisational Data Privacy Compliance. -- Security and Privacy Implications of AI-Driven Digital Phenotyping. -- Adopting LLMs in Internet of Cloud Ecosystems: Identifying the Key Privacy Challenges. -- Public Perceptions of Trustworthy AI: Insights from a Longitudinal Study of UK News Media. -- Technical Attacks & Defenses. -- Beyond phishing: A human-centered exploration of cyber incident reporting. -- Words matter: Applying the Elaboration Likelihood Model to Examine the persuasive cues evident in True and Fake News about the ‘Indigenous Voice to Parliament’. -- A Structured Approach to Log Design: Addressing Security and Compliance Gaps in Software Development. -- A Literature Review on Rule-Based Systems as Decision Support Systems. -- Online Authentication for Users with Visual Disabilities. -- SoK: A Systematic Review of Context- and Behavior-Aware Adaptive Authentication in Mobile Environments. -- On the Inconsistency of Update-Related Vulnerabilities. -- Cybersecurity Strategies to Mitigate Insider Threats in Multi-Cloud Environments
Persistent Identifier URN: urn:nbn:de:101:1-2510300313384.924823596884
DOI: 10.1007/978-3-032-02504-3
URL https://doi.org/10.1007/978-3-032-02504-3
ISBN/Einband/Preis 978-3-032-02504-3
Sprache(n) Englisch (eng)
Beziehungen IFIP Advances in Information and Communication Technology ; 761
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 227 von 4512875
< < > <


E-Mail-IconAdministration