Read more
This volume constitutes the proceedings of the 19th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2025, held in Mytilene, Greece, during July 7 9, 2025.
The 30 full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in the following topical sections: Awareness & Education; Security Culture; Privacy and Technical Attacks & Defenses.
List of contents
.- Awareness & Education.
.- Thematic Analysis of Cybersecurity Awareness Strategies and Approaches.
.- Investigating Cyber-Situational Awareness for Cyber Ranges in Offshore Operations.
.- I m in Portrayal of Hacking in Movies and TV Shows.
.- Cybersecurity and emerging technologies: Investigating individuals ability to identify deepfake media.
.- Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study.
.- Transmission, Evaluation, Culture Internal Communications as a Catalyst for Information Security Awareness.
.- Theoretical Underpinnings for Consideration in the Design of a Secure Programming Course.
.- Cybersecurity Vulnerabilities of Female Learners: The Case of South African Marginalised School.
.- Supporting cyber security knowledge and skills in non-computing disciplines.
.- Multidisciplinary Pathways into Cyber Threat Intelligence Roles: Mapping Knowledge Areas and Transferable Skills.
.- Security Culture.
.- How Digital Evidence Seizure Times Affect Swedish Citizens Willingness to Report Crimes.
.- A Cyber4Dev Security Culture Model for SMMEs in South Africa.
.- Reimagining AI as a Psychosocial Buffer: A Conceptual Model for Mitigating Burnout and Quiet Quitting in Cybersecurity.
.- Factors Contributing to Cybersecurity Fatigue.
.- Increasing a Product s Perceived Cybersecurity by Indicating the Country of Origin.
.- Privacy.
.- Digital Coercive Control: Towards Understanding Item Finder Misuse.
.- Of course, that s not feasible for everyone Compiling and Evaluating Privacy Recommendations in Expert Interviews.
.- A Holistic Profile for the Information Privacy Aware and Competent User.
.- Reducing Role Ambiguity for Organisational Data Privacy Compliance.
.- Security and Privacy Implications of AI-Driven Digital Phenotyping.
.- Adopting LLMs in Internet of Cloud Ecosystems: Identifying the Key Privacy Challenges.
.- Public Perceptions of Trustworthy AI: Insights from a Longitudinal Study of UK News Media.
.- Technical Attacks & Defenses.
.- Beyond phishing: A human-centered exploration of cyber incident reporting.
.- Words matter: Applying the Elaboration Likelihood Model to Examine the persuasive cues evident in True and Fake News about the Indigenous Voice to Parliament .
.- A Structured Approach to Log Design: Addressing Security and Compliance Gaps in Software Development.
.- A Literature Review on Rule-Based Systems as Decision Support Systems.
.- Online Authentication for Users with Visual Disabilities.
.- SoK: A Systematic Review of Context- and Behavior-Aware Adaptive Authentication in Mobile Environments.
.- On the Inconsistency of Update-Related Vulnerabilities.
.- Cybersecurity Strategies to Mitigate Insider Threats in Multi-Cloud Environments.