|
|
|
|
LEADER |
03348nam a22005895i 4500 |
001 |
978-3-319-20376-8 |
003 |
DE-He213 |
005 |
20151204185041.0 |
007 |
cr nn 008mamaa |
008 |
150720s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319203768
|9 978-3-319-20376-8
|
024 |
7 |
|
|a 10.1007/978-3-319-20376-8
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA75.5-76.95
|
072 |
|
7 |
|a UY
|2 bicssc
|
072 |
|
7 |
|a COM069000
|2 bisacsh
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.743
|2 23
|
245 |
1 |
0 |
|a Human Aspects of Information Security, Privacy, and Trust
|h [electronic resource] :
|b Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings /
|c edited by Theo Tryfonas, Ioannis Askoxylakis.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XVIII, 719 p. 206 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9190
|
505 |
0 |
|
|a Authentication -- Cybersecurity -- Privacy, security and user behaviour -- Security in social media and smart technologies -- Security Technologies.
|
520 |
|
|
|a This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Information technology.
|
650 |
|
0 |
|a Business
|x Data processing.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Models and Principles.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a IT in Business.
|
700 |
1 |
|
|a Tryfonas, Theo.
|e editor.
|
700 |
1 |
|
|a Askoxylakis, Ioannis.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319203751
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9190
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-20376-8
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|