Table of contents - Special Issue: Selected papers from the HAISA 2008 symposium
Guest Editors: Steven M. Furnell, Dr Nathan Clarke
An integrated view of human, organizational, and technological challenges of IT security management
Rodrigo Werlinger, Kirstie Hawkey, Konstantin BeznosovThe purpose of this study is to determine the main challenges that IT security practitioners face in their organizations, including the interplay among human, organizational, and…
A cognitive walkthrough of Autopsy Forensic Browser
David J. Bennett, Paul StephensThe purpose of this paper is to review the usability of the Autopsy Forensic Browser in order to improve future versions of this, or similar, tools.
Formalizing the ranking of authentication products
Kirsi Helkala, Einar SnekkenesThe purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific…
Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end‐users
Martyn Styles, Theo TryfonasThe purpose of this case study paper is to demonstrate that, no matter how complex computer security systems are, effort should be concentrated and focused on employees to improve…
Social engineering: assessing vulnerabilities in practice
Taimur Bakhshi, Maria Papadaki, Steven FurnellThe purpose of this paper is to investigate the level of susceptibility to social engineering amongst staff within a cooperating organisation.