E-Book, Englisch, 484 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
Moallem HCI for Cybersecurity, Privacy and Trust
Erscheinungsjahr 2019
ISBN: 978-3-030-22351-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings
E-Book, Englisch, 484 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-030-22351-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Authentication.-
Grid Authentication: A Memorability and User Sentiment Study.- Consonant-Vowel-Consonants for Error-Free Code Entry.- Two-Factor Authentication using Leap Motion and Numeric Keypad.- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction.- BREAKING: Password Entry is Fine.- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication.-
Cybersecurity Awareness and Behavior.-
From Cyber-Security Deception To Manipulation and Gratification Through Gamification.- Gamifying Security Awareness: A New Prototype.- Alerting Users about Phishing Attacks.- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties.- Understanding Perceptions: User Responses to Browser Warning Messages.- Understanding Parents' Concerns with Smart Device Usage in the Home.- Gamification Techniques for Raising Cyber Security Awareness.- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain.-
Security and Usability.-
A Framework of Information Security Integrated with Human Factors.- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets.- Policy Creation for Enterprise-Level Data Sharing.- Classification of Web History Tools Through Web Analysis.- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence.- Behind the façade: Paradigms of Ubiquitous Cryptography.- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them?.- Informing Hybrid System Design in Cyber Security Incident Response.- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions.-
Privacy and Trust.-
Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors.- Trust in Autonomous Technologies - A contextual comparison of influencing user factors.- PrivacyPreserving System for Real-time Enriched-Integrated Service with Feedback to Providers.- The Automatic Detection of Sensitive Data in Smart Homes.- Privacy Preservation for Versatile Pay-TV Services.- Company Privacy Dashboards: Employee Needs and Requirements.- Privacy and Power Implications of Web Location of Personal Data Authenticators.- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust.- Measuring network user trust via mouse behavior characteristics under different emotions.