HCI for Cybersecurity, Privacy and Trust
Springer International Publishing (Verlag)
978-3-030-77391-5 (ISBN)
The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions.
HCI-CPT 2021 includes a total of 30 papers; they were organized in topical sections named: usable security; security and privacy by design; user behavior analysis in cybersecurity; and security and privacy awareness.
Usable Security.- Authentication Management of Home IoT Devices.- Emics and Etics of Usable Security: Culturally Specific or Culturally Universal?.- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks.- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review.- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes.- Risk Assessment of "Ostrich ZIP".- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users.- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services.- Security and Privacy by Design.- Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience.- A Human Factor Approach to Threat Modeling.- Smart Technologies and Internet of Things Designed for Aging in Place.- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration.- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces.- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk.- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior.- Privacy Design Strategies and the GDPR: A Systematic Literature Review.- User Behavior Analysis in Cybersecurity.- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure.- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices.- Perceptions of Security and Privacy in mHealth.- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.- CyberPin - Challenges on Recognizing Youngest Cyber Talents.- It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness.- Understanding the Last Line of Defense: Human Response to Cybersecurity Events.- Security and Privacy Awareness.- The Effectiveness of Video Messaging Campaigns to Use 2FA.- A Study on Online Businesses' Commitment to Consumer Privacy.- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks.- Social Engineering Attacks: Recent Advances and Challenges.- Brand Validation: Security Indicator to Better Indicate Website Identity.- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials.- Gaming Apps' and Social Media Partnership: A Privacy Perspective.
Erscheinungsdatum | 27.05.2021 |
---|---|
Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
Zusatzinfo | XIX, 490 p. 97 illus., 67 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 767 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Software Entwicklung ► User Interfaces (HCI) | |
Schlagworte | Access Control • Applications • Artificial Intelligence • authentication • computer crime • Computer Science • Computer Security • conference proceedings • cryptography • cyber security • Data communication systems • data privacy • Data Security • Human-Computer interaction • Informatics • Information Retrieval • Internet • Network Protocols • Network Security • privacy • Research • Security Systems • Signal Processing • Telecommunication networks |
ISBN-10 | 3-030-77391-4 / 3030773914 |
ISBN-13 | 978-3-030-77391-5 / 9783030773915 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich