Información del autor
Autor Furnell, Steven |
Documentos disponibles escritos por este autor (11)
Crear una solicitud de compra Refinar búsqueda
Computer Security / Katsikas, Sokratis ; Cuppens, Frédéric ; Cuppens, Nora ; Lambrinoudakis, Costas ; Kalloniatis, Christos ; Mylopoulos, John ; Antón, Annie ; Gritzalis, Stefanos ; Pallas, Frank ; Pohle, Jörg ; Sasse, Angela ; Meng, Weizhi ; Furnell, Steven ; Garcia-Alfaro, Joaquin
TÃtulo : Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / Tipo de documento: documento electrónico Autores: Katsikas, Sokratis, ; Cuppens, Frédéric, ; Cuppens, Nora, ; Lambrinoudakis, Costas, ; Kalloniatis, Christos, ; Mylopoulos, John, ; Antón, Annie, ; Gritzalis, Stefanos, ; Pallas, Frank, ; Pohle, Jörg, ; Sasse, Angela, ; Meng, Weizhi, ; Furnell, Steven, ; Garcia-Alfaro, Joaquin, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XXIII, 440 p. 282 ilustraciones, 72 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-42048-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras IngenierÃa Informática IngenierÃa de software Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática IngenierÃa Informática y Redes Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas posteriores a la conferencia arbitradas del Quinto Taller Internacional sobre Seguridad de Sistemas de Control Industrial y Sistemas CiberfÃsicos, CyberICPS 2019, el Tercer Taller Internacional sobre IngenierÃa de Requisitos de Seguridad y Privacidad, SECPRE 2019, el Primer Taller Internacional sobre Seguridad, Privacidad, Organizaciones e IngenierÃa de Sistemas, SPOSE 2019, y el Segundo Taller Internacional sobre Ataques y Defensas para Internet de las Cosas, ADIoT 2019, celebrado en la ciudad de Luxemburgo, Luxemburgo, en septiembre de 2019, junto con el 24.° Simposio Europeo sobre Investigación en Seguridad Informática, ESORICS 2019. El Taller CyberICPS recibió 13 presentaciones de las cuales se seleccionaron 5 artÃculos completos y 2 artÃculos cortos para su presentación. Abarcan temas relacionados con amenazas, vulnerabilidades y riesgos que enfrentan los sistemas ciberfÃsicos y los sistemas de control industrial; ciberataques que puedan lanzarse contra dichos sistemas; y formas de detectar y responder a tales ataques. Del Taller SECPRE se incluyen 9 artÃculos completos de 14 envÃos. Los artÃculos seleccionados abordan aspectos de aseguramiento y evaluación de requisitos de seguridad y privacidad; y obtención y modelado de requisitos de seguridad y cumplimiento del RGPD. El Taller SPOSE recibió 7 presentaciones de las cuales se aceptaron para publicación 3 artÃculos completos y 1 artÃculo de demostración. Demuestran el espectro posible para una investigación fructÃfera en la intersección de la seguridad, la privacidad, la ciencia organizacional y la ingenierÃa de sistemas. Del Taller ADIoT se incluyen 5 artÃculos completos y 2 artÃculos cortos de 16 presentaciones. Los artÃculos se centran en los ataques y defensas de IoT y analizan soluciones prácticas o teóricas para identificar vulnerabilidades y mecanismos de seguridad de IoT. . Nota de contenido: Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). Tipo de medio : Computadora Summary : This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 9 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. The SPOSE Workshop received 7 submissions from which 3 full papers and 1 demo paper were accepted for publication. They demonstrate the possible spectrum for fruitful research at the intersection of security, privacy, organizational science, and systems engineering. From the ADIoT Workshop 5 full papers and 2 short papers out of 16 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Computer Security : ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26–27, 2019 Revised Selected Papers / [documento electrónico] / Katsikas, Sokratis, ; Cuppens, Frédéric, ; Cuppens, Nora, ; Lambrinoudakis, Costas, ; Kalloniatis, Christos, ; Mylopoulos, John, ; Antón, Annie, ; Gritzalis, Stefanos, ; Pallas, Frank, ; Pohle, Jörg, ; Sasse, Angela, ; Meng, Weizhi, ; Furnell, Steven, ; Garcia-Alfaro, Joaquin, . - 1 ed. . - [s.l.] : Springer, 2020 . - XXIII, 440 p. 282 ilustraciones, 72 ilustraciones en color.
ISBN : 978-3-030-42048-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) Software de la aplicacion Red de computadoras IngenierÃa Informática IngenierÃa de software Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Redes de comunicación informática IngenierÃa Informática y Redes Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas posteriores a la conferencia arbitradas del Quinto Taller Internacional sobre Seguridad de Sistemas de Control Industrial y Sistemas CiberfÃsicos, CyberICPS 2019, el Tercer Taller Internacional sobre IngenierÃa de Requisitos de Seguridad y Privacidad, SECPRE 2019, el Primer Taller Internacional sobre Seguridad, Privacidad, Organizaciones e IngenierÃa de Sistemas, SPOSE 2019, y el Segundo Taller Internacional sobre Ataques y Defensas para Internet de las Cosas, ADIoT 2019, celebrado en la ciudad de Luxemburgo, Luxemburgo, en septiembre de 2019, junto con el 24.° Simposio Europeo sobre Investigación en Seguridad Informática, ESORICS 2019. El Taller CyberICPS recibió 13 presentaciones de las cuales se seleccionaron 5 artÃculos completos y 2 artÃculos cortos para su presentación. Abarcan temas relacionados con amenazas, vulnerabilidades y riesgos que enfrentan los sistemas ciberfÃsicos y los sistemas de control industrial; ciberataques que puedan lanzarse contra dichos sistemas; y formas de detectar y responder a tales ataques. Del Taller SECPRE se incluyen 9 artÃculos completos de 14 envÃos. Los artÃculos seleccionados abordan aspectos de aseguramiento y evaluación de requisitos de seguridad y privacidad; y obtención y modelado de requisitos de seguridad y cumplimiento del RGPD. El Taller SPOSE recibió 7 presentaciones de las cuales se aceptaron para publicación 3 artÃculos completos y 1 artÃculo de demostración. Demuestran el espectro posible para una investigación fructÃfera en la intersección de la seguridad, la privacidad, la ciencia organizacional y la ingenierÃa de sistemas. Del Taller ADIoT se incluyen 5 artÃculos completos y 2 artÃculos cortos de 16 presentaciones. Los artÃculos se centran en los ataques y defensas de IoT y analizan soluciones prácticas o teóricas para identificar vulnerabilidades y mecanismos de seguridad de IoT. . Nota de contenido: Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2019) -- Security and Privacy Requirements Engineering (SECPRE 2019) -- Security, Privacy, Organizations, and Systems Engineering (SPOSE 2019) -- Attacks and Defenses for Internet-of-Things (ADIoT 2019). Tipo de medio : Computadora Summary : This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 9 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. The SPOSE Workshop received 7 submissions from which 3 full papers and 1 demo paper were accepted for publication. They demonstrate the possible spectrum for fruitful research at the intersection of security, privacy, organizational science, and systems engineering. From the ADIoT Workshop 5 full papers and 2 short papers out of 16 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Computer Security / Katsikas, Sokratis ; Cuppens, Frédéric ; Cuppens, Nora ; Lambrinoudakis, Costas ; Kalloniatis, Christos ; Mylopoulos, John ; Antón, Annie ; Gritzalis, Stefanos ; Meng, Weizhi ; Furnell, Steven
TÃtulo : Computer Security : ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers / Tipo de documento: documento electrónico Autores: Katsikas, Sokratis, ; Cuppens, Frédéric, ; Cuppens, Nora, ; Lambrinoudakis, Costas, ; Kalloniatis, Christos, ; Mylopoulos, John, ; Antón, Annie, ; Gritzalis, Stefanos, ; Meng, Weizhi, ; Furnell, Steven, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XVIII, 265 p. 75 ilustraciones, 50 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-64330-0 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos IngenierÃa Informática Red de computadoras CriptografÃa Cifrado de datos (Informática) IngenierÃa de software Seguridad de datos e información IngenierÃa Informática y Redes CriptologÃa Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas posteriores a la conferencia del 6to Taller Internacional sobre Seguridad de Sistemas de Control Industrial y Sistemas CiberfÃsicos, CyberICPS 2020, el Segundo Taller Internacional sobre IngenierÃa de Requisitos de Seguridad y Privacidad, SECPRE 2020, y el Tercer Taller Internacional sobre Ataques. and Defenses for Internet-of-Things, ADIoT 2020, celebrada en Guildford, Reino Unido, en septiembre de 2020 junto con el 25º Simposio Europeo sobre Investigación en Seguridad Informática, ESORICS 2020. Debido a la pandemia de COVID-19, la conferencia se celebró de forma virtual. The CyberICPS El taller recibió 21 presentaciones de las cuales se seleccionaron 5 artÃculos completos para su presentación. Abarcan temas relacionados con amenazas, vulnerabilidades y riesgos que enfrentan los sistemas ciberfÃsicos y los sistemas de control industrial; los ciberataques que puedan lanzarse contra dichos sistemas; y formas de detectar y responder a tales ataques. Del Taller SECPRE se incluyen 4 artÃculos completos de 7 envÃos. Los artÃculos seleccionados abordan aspectos de aseguramiento y evaluación de requisitos de seguridad y privacidad; y obtención y modelado de requisitos de seguridad y cumplimiento del RGPD. Del Taller ADIoT se incluyen 2 artÃculos completos y 2 artÃculos cortos de 12 envÃos. Los artÃculos se centran en los ataques y defensas de IoT y analizan soluciones prácticas o teóricas para identificar vulnerabilidades y mecanismos de seguridad de IoT. Nota de contenido: CyberICPS Workshop -- Integrated Analysis of Safety and Security Hazards in Automotive Systems -- Attack Path Analysis for Cyber-Physical Systems -- Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System -- A Survey of Cryptography-Based Authentication for Smart Grid Communication -- Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment -- IoT Vulnerability Scanning: A State of the Art -- Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems -- Self Adaptive Privacy in Cloud Computing Environments: Identifying the major socio-technical concepts -- SECPRE Workshop -- Definition and Verification of Security Configurations of Cyber-Physical Systems -- GDPR Compliance: Proposed Guidelines for Cloud-based Health Organizations -- Aligning the Concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems -- Identifying Implicit Vulnerabilities through Personas as Goal Models -- ADIoT Workshop -- Cooperative Speed Estimation of an RF Jammerin Wireless Vehicular Networks -- Extended Abstract: Towards Physical-LayerAuthentication for Backscatter Devices -- P2Onto: Making Privacy Policies Transparent -- Extended Abstract - Transformers: Intrusion Detection Data In Disguise. Tipo de medio : Computadora Summary : This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Computer Security : ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020, Revised Selected Papers / [documento electrónico] / Katsikas, Sokratis, ; Cuppens, Frédéric, ; Cuppens, Nora, ; Lambrinoudakis, Costas, ; Kalloniatis, Christos, ; Mylopoulos, John, ; Antón, Annie, ; Gritzalis, Stefanos, ; Meng, Weizhi, ; Furnell, Steven, . - 1 ed. . - [s.l.] : Springer, 2020 . - XVIII, 265 p. 75 ilustraciones, 50 ilustraciones en color.
ISBN : 978-3-030-64330-0
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos IngenierÃa Informática Red de computadoras CriptografÃa Cifrado de datos (Informática) IngenierÃa de software Seguridad de datos e información IngenierÃa Informática y Redes CriptologÃa Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas posteriores a la conferencia del 6to Taller Internacional sobre Seguridad de Sistemas de Control Industrial y Sistemas CiberfÃsicos, CyberICPS 2020, el Segundo Taller Internacional sobre IngenierÃa de Requisitos de Seguridad y Privacidad, SECPRE 2020, y el Tercer Taller Internacional sobre Ataques. and Defenses for Internet-of-Things, ADIoT 2020, celebrada en Guildford, Reino Unido, en septiembre de 2020 junto con el 25º Simposio Europeo sobre Investigación en Seguridad Informática, ESORICS 2020. Debido a la pandemia de COVID-19, la conferencia se celebró de forma virtual. The CyberICPS El taller recibió 21 presentaciones de las cuales se seleccionaron 5 artÃculos completos para su presentación. Abarcan temas relacionados con amenazas, vulnerabilidades y riesgos que enfrentan los sistemas ciberfÃsicos y los sistemas de control industrial; los ciberataques que puedan lanzarse contra dichos sistemas; y formas de detectar y responder a tales ataques. Del Taller SECPRE se incluyen 4 artÃculos completos de 7 envÃos. Los artÃculos seleccionados abordan aspectos de aseguramiento y evaluación de requisitos de seguridad y privacidad; y obtención y modelado de requisitos de seguridad y cumplimiento del RGPD. Del Taller ADIoT se incluyen 2 artÃculos completos y 2 artÃculos cortos de 12 envÃos. Los artÃculos se centran en los ataques y defensas de IoT y analizan soluciones prácticas o teóricas para identificar vulnerabilidades y mecanismos de seguridad de IoT. Nota de contenido: CyberICPS Workshop -- Integrated Analysis of Safety and Security Hazards in Automotive Systems -- Attack Path Analysis for Cyber-Physical Systems -- Identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System -- A Survey of Cryptography-Based Authentication for Smart Grid Communication -- Cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment -- IoT Vulnerability Scanning: A State of the Art -- Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems -- Self Adaptive Privacy in Cloud Computing Environments: Identifying the major socio-technical concepts -- SECPRE Workshop -- Definition and Verification of Security Configurations of Cyber-Physical Systems -- GDPR Compliance: Proposed Guidelines for Cloud-based Health Organizations -- Aligning the Concepts of Risk, Security and Privacy towards the design of Secure Intelligent Transport Systems -- Identifying Implicit Vulnerabilities through Personas as Goal Models -- ADIoT Workshop -- Cooperative Speed Estimation of an RF Jammerin Wireless Vehicular Networks -- Extended Abstract: Towards Physical-LayerAuthentication for Backscatter Devices -- P2Onto: Making Privacy Policies Transparent -- Extended Abstract - Transformers: Intrusion Detection Data In Disguise. Tipo de medio : Computadora Summary : This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / Tipo de documento: documento electrónico Autores: Clarke, Nathan, ; Furnell, Steven, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XI, 367 p. 51 ilustraciones, 30 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-57404-8 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Aplicaciones informáticas y de sistemas de información Seguridad móvil y de red Redes de comunicación informática CriptologÃa Seguridad de datos e información Red informática Cifrado de datos (Informática) CriptografÃa Protección de datos Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este libro constituye las actas del 14.º Simposio internacional IFIP WG 11.12 sobre aspectos humanos de la seguridad y garantÃa de la información, HAISA 2020, celebrado en Mitilene, Lesbos, Grecia, en julio de 2020.* Los 27 artÃculos completos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionado entre 43 presentaciones. Están organizados en las siguientes secciones temáticas: privacidad y COVID-19; sensibilización y formación; IngenierÃa social; comportamiento de seguridad; educación; seguridad del usuario final; seguridad utilizable; politica de seguridad; y actitudes y percepciones. *El simposio se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees' Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users' Software Robustness -- Security Policy -- SMEs' Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- "Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings / [documento electrónico] / Clarke, Nathan, ; Furnell, Steven, . - 1 ed. . - [s.l.] : Springer, 2020 . - XI, 367 p. 51 ilustraciones, 30 ilustraciones en color.
ISBN : 978-3-030-57404-8
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Aplicaciones informáticas y de sistemas de información Seguridad móvil y de red Redes de comunicación informática CriptologÃa Seguridad de datos e información Red informática Cifrado de datos (Informática) CriptografÃa Protección de datos Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este libro constituye las actas del 14.º Simposio internacional IFIP WG 11.12 sobre aspectos humanos de la seguridad y garantÃa de la información, HAISA 2020, celebrado en Mitilene, Lesbos, Grecia, en julio de 2020.* Los 27 artÃculos completos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionado entre 43 presentaciones. Están organizados en las siguientes secciones temáticas: privacidad y COVID-19; sensibilización y formación; IngenierÃa social; comportamiento de seguridad; educación; seguridad del usuario final; seguridad utilizable; politica de seguridad; y actitudes y percepciones. *El simposio se realizó de manera virtual debido a la pandemia de COVID-19. Nota de contenido: Privacy and COVID-19 -- Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? -- Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa -- A review of information security aspects of the emerging covid19 contact tracing mobile phone applications -- Awareness and Training -- Towards a Cross-Cultural Education Framework for Online Safety Awareness -- A heuristic point of view of cybersecurity and online safety pedagogy -- Context Based Micro Training: A Framework for Information Security Training -- Social Engineering -- Employees' Ambition for Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test -- Does ubuntu influence social engineering susceptibility? -- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory -- Security Behaviour -- Kids Doodle Pass: An Exploratory Study of an Authentication Mechanism for Young Children -- Information security behavioural threshold analysis in practice: An implementation framework -- Information security behaviour: Development of a measurement instrument based on the self-determination theory -- Education -- Addressing SME Characteristics for Designing Information Security Maturity Models -- Cyber Security Education and Training: Delivering industry relevant education and skills via Degree Apprenticeships -- Internet Self-Regulation in Higher Education: A Metacognitive approach to Internet Addiction -- End-User Security -- Evaluation of User App Choices in the Presence of Risk Communication on Android Devices -- Exploring Information Security and Domestic Equality -- Responding to KRACK: Wi-Fi Security Awareness in Private Households -- Usable Security -- Exploring the meaning of "usable security" -- Dyslexia and Password Usage: Accessibility in Authentication Design -- Securing User eXperience (SUX): A Review For the End-Users' Software Robustness -- Security Policy -- SMEs' Confidentiality Concerns for Security Information Sharing -- Validation of an information privacy perception instrument at a Zimbabwean university -- Are We Really Informed on the Rights GDPR Guarantees? -- Attitudes and Perceptions -- "Most Companies Share Whatever They Can to Make Money!": Comparing User's Perceptions with the Data Practices of IoT Devices -- Analysis of the 'Open Source Internet Research Tool': A Usage Perspective from UK Law Enforcement -- Critical analysis of Information Security Culture Definitions. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Human Aspects of Information Security and Assurance : 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings / Tipo de documento: documento electrónico Autores: Furnell, Steven, ; Clarke, Nathan, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: X, 223 p. 44 ilustraciones, 40 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-81111-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Red informática Redes de comunicación informática Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Protección de datos Application software Cifrado de datos (Informática) CriptografÃa Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este libro constituye las actas del 15.º Simposio internacional IFIP WG 11.12 sobre aspectos humanos de la seguridad y garantÃa de la información, HAISA 2021, celebrado virtualmente en julio de 2021. Los 18 artÃculos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 30 presentaciones. Están organizados en las siguientes secciones temáticas: actitudes y perspectivas; educación en ciberseguridad; y personas y tecnologÃa. Nota de contenido: Attitudes and Perspectives -- Cyber Security in Healthcare Organisations -- Cybersecurity and digital exclusion of seniors: what do they fear? -- Exploring experiences of using SETA in Nordic municipalities -- Cyber Security Education -- SherLOCKED: A Detective-themed Serious Game for Cyber Security Education -- A Reference Point for Designing a Cybersecurity Curriculum for Universities -- A Conceptual Information Security Culture Framework for Higher Learning Institutions -- What can we learn from the analysis of information security policies: the case of UK's schools -- A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity -- Evaluation strategies for cybersecurity training methods: a literature review -- People and Technology -- When Googling it doesn't work: The challenge of finding security advice for smart home devices -- Making Access Control Easy in IoT -- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation -- Friend or Foe: An investigation into recipient identification of SMS-based phishing -- Towards a Risk Assessment Matrix for Information Security Workarounds -- A Theoretical Underpinning for Examining Insider Attacks leveraging the Fraud Pentagon -- A Systematic Literature Review on Virtual Reality Authentication -- Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints -- The one-eyed leading the blind: Understanding differences between IT professionals and non-IT staff when creating and managing passwords. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021. The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Human Aspects of Information Security and Assurance : 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings / [documento electrónico] / Furnell, Steven, ; Clarke, Nathan, . - 1 ed. . - [s.l.] : Springer, 2021 . - X, 223 p. 44 ilustraciones, 40 ilustraciones en color.
ISBN : 978-3-030-81111-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Red informática Redes de comunicación informática Seguridad de datos e información CriptologÃa Aplicaciones informáticas y de sistemas de información Protección de datos Application software Cifrado de datos (Informática) CriptografÃa Clasificación: 005.3 Ciencia de los computadores (Programas) Resumen: Este libro constituye las actas del 15.º Simposio internacional IFIP WG 11.12 sobre aspectos humanos de la seguridad y garantÃa de la información, HAISA 2021, celebrado virtualmente en julio de 2021. Los 18 artÃculos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 30 presentaciones. Están organizados en las siguientes secciones temáticas: actitudes y perspectivas; educación en ciberseguridad; y personas y tecnologÃa. Nota de contenido: Attitudes and Perspectives -- Cyber Security in Healthcare Organisations -- Cybersecurity and digital exclusion of seniors: what do they fear? -- Exploring experiences of using SETA in Nordic municipalities -- Cyber Security Education -- SherLOCKED: A Detective-themed Serious Game for Cyber Security Education -- A Reference Point for Designing a Cybersecurity Curriculum for Universities -- A Conceptual Information Security Culture Framework for Higher Learning Institutions -- What can we learn from the analysis of information security policies: the case of UK's schools -- A Wolf, Hyena, and Fox game that tells pre-school children about cybersecurity -- Evaluation strategies for cybersecurity training methods: a literature review -- People and Technology -- When Googling it doesn't work: The challenge of finding security advice for smart home devices -- Making Access Control Easy in IoT -- The Development of a Multidisciplinary Cybersecurity Workforce: An Investigation -- Friend or Foe: An investigation into recipient identification of SMS-based phishing -- Towards a Risk Assessment Matrix for Information Security Workarounds -- A Theoretical Underpinning for Examining Insider Attacks leveraging the Fraud Pentagon -- A Systematic Literature Review on Virtual Reality Authentication -- Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints -- The one-eyed leading the blind: Understanding differences between IT professionals and non-IT staff when creating and managing passwords. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021. The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Information Systems Security and Privacy : 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers Tipo de documento: documento electrónico Autores: Mori, Paolo, ; Furnell, Steven, ; Camp, Olivier, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XII, 303 p. 137 ilustraciones, 75 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-25109-3 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Red informática Seguridad de datos e información Entornos informáticos Seguridad móvil y de red IngenierÃa Informática y Redes Redes de comunicación informática CriptologÃa Cifrado de datos (Informática) Ordenador IngenierÃa Informática Protecci Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye los artÃculos revisados ​​seleccionados de la 4ta Conferencia Internacional sobre Seguridad y Privacidad de los Sistemas de Información, ICISSP 2018, celebrada en Funchal - Madeira, Portugal, en enero de 2018. Los 15 artÃculos completos presentados fueron cuidadosamente revisados ​​y seleccionados de un total de 71 presentaciones. . Se ocupan de temas como la seguridad de datos y software; privacidad y confidencialidad; seguridad de sistemas móviles; autenticación biométrica; seguridad y privacidad de los sistemas de información; modelos de autenticación, privacidad y seguridad; minerÃa de datos y descubrimiento de conocimientos; suplantación de identidad; análisis de diseño y arquitectura de seguridad; pruebas de seguridad; análisis de vulnerabilidad y contramedidas; aplicaciones y servicios web. Nota de contenido: Fine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform -- Touch and Move: Incoming Call User Authentication -- Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS -- A Simple Attack on CaptchaStar -- Notify this: Exploiting Android Notiï¬cations for Fun and Proï¬t -- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling -- A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack -- GenVote: Blockchain-based Customizable and Secure Voting Platform -- A Detailed Analysis of the CICIDS2017 Data Set -- Personalising Security Education: Factors Influencing Individual Awareness and Compliance -- Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study -- On Building a Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs -- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction -- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data. Tipo de medio : Computadora Summary : This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Information Systems Security and Privacy : 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers [documento electrónico] / Mori, Paolo, ; Furnell, Steven, ; Camp, Olivier, . - 1 ed. . - [s.l.] : Springer, 2019 . - XII, 303 p. 137 ilustraciones, 75 ilustraciones en color.
ISBN : 978-3-030-25109-3
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Red informática Seguridad de datos e información Entornos informáticos Seguridad móvil y de red IngenierÃa Informática y Redes Redes de comunicación informática CriptologÃa Cifrado de datos (Informática) Ordenador IngenierÃa Informática Protecci Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye los artÃculos revisados ​​seleccionados de la 4ta Conferencia Internacional sobre Seguridad y Privacidad de los Sistemas de Información, ICISSP 2018, celebrada en Funchal - Madeira, Portugal, en enero de 2018. Los 15 artÃculos completos presentados fueron cuidadosamente revisados ​​y seleccionados de un total de 71 presentaciones. . Se ocupan de temas como la seguridad de datos y software; privacidad y confidencialidad; seguridad de sistemas móviles; autenticación biométrica; seguridad y privacidad de los sistemas de información; modelos de autenticación, privacidad y seguridad; minerÃa de datos y descubrimiento de conocimientos; suplantación de identidad; análisis de diseño y arquitectura de seguridad; pruebas de seguridad; análisis de vulnerabilidad y contramedidas; aplicaciones y servicios web. Nota de contenido: Fine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform -- Touch and Move: Incoming Call User Authentication -- Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS -- A Simple Attack on CaptchaStar -- Notify this: Exploiting Android Notiï¬cations for Fun and Proï¬t -- The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling -- A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack -- GenVote: Blockchain-based Customizable and Secure Voting Platform -- A Detailed Analysis of the CICIDS2017 Data Set -- Personalising Security Education: Factors Influencing Individual Awareness and Compliance -- Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study -- On Building a Visualisation Tool for Access Control Policies -- Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs -- Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction -- Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data. Tipo de medio : Computadora Summary : This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] PermalinkPermalinkPermalinkPermalinkSecurity in Cyber-Physical Systems / Awad, Ali Ismail ; Furnell, Steven ; Paprzycki, Marcin ; Sharma, Sudhir Kumar
PermalinkTrust, Privacy and Security in Digital Business / Furnell, Steven ; Mouratidis, Haralambos ; Pernul, Günther
Permalink