000 | 05773nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-22351-9 | ||
003 | DE-He213 | ||
005 | 20240730172915.0 | ||
007 | cr nn 008mamaa | ||
008 | 190611s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030223519 _9978-3-030-22351-9 |
||
024 | 7 |
_a10.1007/978-3-030-22351-9 _2doi |
|
050 | 4 | _aQA76.9.U83 | |
050 | 4 | _aQA76.9.H85 | |
072 | 7 |
_aUYZ _2bicssc |
|
072 | 7 |
_aCOM079010 _2bisacsh |
|
072 | 7 |
_aUYZ _2thema |
|
082 | 0 | 4 |
_a005.437 _223 |
082 | 0 | 4 |
_a004.019 _223 |
245 | 1 | 0 |
_aHCI for Cybersecurity, Privacy and Trust _h[electronic resource] : _bFirst International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings / _cedited by Abbas Moallem. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXIX, 484 p. 292 illus., 131 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v11594 |
|
505 | 0 | _aAuthentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- PrivacyPreserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions. | |
520 | _aThis book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust. | ||
650 | 0 |
_aUser interfaces (Computer systems). _911681 |
|
650 | 0 |
_aHuman-computer interaction. _96196 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9106054 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 1 | 4 |
_aUser Interfaces and Human Computer Interaction. _931632 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9106055 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
700 | 1 |
_aMoallem, Abbas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9106056 |
|
710 | 2 |
_aSpringerLink (Online service) _9106057 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030223502 |
776 | 0 | 8 |
_iPrinted edition: _z9783030223526 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v11594 _9106058 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-22351-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88629 _d88629 |