Buch, Englisch, 448 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
Buch, Englisch, 448 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-319-07619-5
Verlag: Springer International Publishing
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Usable Security.- On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security.- A Network Telescope for Early Warning Intrusion Detection.- Visualization of System Log Files for Post-incident Analysis and Response.- An Assessment Framework for Usable-Security Based on Decision Science.- On Designing Usable Policy Languages for Declarative Trust Aggregation.- An Image-Based CAPTCHA Using Sophisticated Mental Rotation.- What Usable Security Really Means: Trusting and Engaging Users.- QR Code Security: A Survey of Attacks and Challenges for Usable Security.- Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India.- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security.- Authentication and Passwords Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.- A Cognitive-Behavioral Framework of User Password Management Lifecycle.- Do Graphical Authentication Systems Solve the Password Memorability Problem.- E-voting Authentication with QR-codes.- I Can’t Type That! P@$$w0rd Entry on Mobile Devices.- Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention.- ACCESS: Describing and Contrasting – Authentication Mechanisms.- Character Strings, Memory and Passwords: What a Recall Study Can Tell Us.- Security Policy and Awareness.- From Regulations to Practice: Achieving Information Security Compliance in Healthcare.- Rethinking the Smart Card Technology.- Compositional Security Modelling: Structure, Economics, and Behaviour.- End User Development and Information Security Culture.- DSAPE – Dynamic Security Awareness Program Evaluation.- A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches.- Changing Faces: Identifying Complex Behavioural Profiles.- Human Behaviour in Cybersecurity.- A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.- Socio-technical Security Analysis of Wireless Hotspots.- A Conceptual Framework to Study Socio-Technical Security.- An Evaluation of Behavioural Profiling on Mobile Devices.- Nudging for Quantitative Access Control Systems.- Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.- The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role of Security Culture.- Privacy Issues.- User Acceptance of Privacy-ABCs: An Exploratory Study.- “My Life Doesn’t Have to Be an Open Book”: A Model to Help Designers to Enhance Privacy Controls on Social Network Sites.- Paper Audit Trails and Voters’ Privacy Concerns.- Mental Models for Usable Privacy: A Position Paper.- Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users.- Privacy Protection Based Privacy ConflictDetection and Solution in Online Social Networks.