HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings /
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 p...
| Συγγραφή απο Οργανισμό/Αρχή: | |
|---|---|
| Άλλοι συγγραφείς: | |
| Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
| Γλώσσα: | English |
| Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
| Έκδοση: | 1st ed. 2019. |
| Σειρά: | Information Systems and Applications, incl. Internet/Web, and HCI ;
11594 |
| Θέματα: | |
| Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Authentication
- Grid Authentication: A Memorability and User Sentiment Study
- Consonant-Vowel-Consonants for Error-Free Code Entry
- Two-Factor Authentication using Leap Motion and Numeric Keypad
- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction
- BREAKING: Password Entry is Fine
- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication
- Cybersecurity Awareness and Behavior
- From Cyber-Security Deception To Manipulation and Gratification Through Gamification
- Gamifying Security Awareness: A New Prototype
- Alerting Users about Phishing Attacks
- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties
- Understanding Perceptions: User Responses to Browser Warning Messages
- Understanding Parents' Concerns with Smart Device Usage in the Home
- Gamification Techniques for Raising Cyber Security Awareness
- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain
- Security and Usability
- A Framework of Information Security Integrated with Human Factors
- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets
- Policy Creation for Enterprise-Level Data Sharing
- Classification of Web History Tools Through Web Analysis
- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence
- Behind the façade: Paradigms of Ubiquitous Cryptography
- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them?
- Informing Hybrid System Design in Cyber Security Incident Response
- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions
- Privacy and Trust
- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors
- Trust in Autonomous Technologies - A contextual comparison of influencing user factors
- Privacy Preserving System for Real-time Enriched-Integrated Service with Feedback to Providers
- The Automatic Detection of Sensitive Data in Smart Homes
- Privacy Preservation for Versatile Pay-TV Services
- Company Privacy Dashboards: Employee Needs and Requirements
- Privacy and Power Implications of Web Location of Personal Data Authenticators
- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust
- Measuring network user trust via mouse behavior characteristics under different emotions.