Buch, Englisch, Band 9750, 289 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 4686 g
4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings
Buch, Englisch, Band 9750, 289 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 4686 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-319-39380-3
Verlag: Springer International Publishing
The 25 papers presented in the HAS 2016 proceedings are organized in topical sections as follows: human factors of authentication; security, privacy, and human behavior; and security technologies.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenbankdesign & Datenbanktheorie
- Geisteswissenschaften Design Interface Design, Interaktionsdesign, Application Design
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion User Interface Design & Benutzerfreundlichkeit
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Digital Lifestyle Handheld, Smartphone, Tablet
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Information Retrieval
Weitere Infos & Material
User Identification Using Games.- Hermes: Hands-Free Authentication in Physical Spaces.- Implicit Authentication for Mobile Devices Using Typing Behavior.- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials.- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices.- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011.- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Personal Health Information Act.- Information Security Application Design: Understanding Your Users.- Responsibility Modelling and Its Application Trust Management.- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks.- Current Trend of End-users’ Behaviors towards Security Mechanisms.- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology.- The Impact of Security Cues on User Perceived Security in E-Commerce.- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks.- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective.- Assessing the Feasibility of Adaptive Security Models for the Internet of Things.- OpenStack Firewall as a Service Rule Analyser.- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes.- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.- The State of Near-Field Communication (NFC) on the Android platform.- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.- A Taxonomy to Classify Risk End-user Profile in Interactionwith the Computing Environment.- Security Middleware Programming Using P4.