語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
HCI for Cybersecurity, Privacy and T...
~
SpringerLink (Online service)
HCI for Cybersecurity, Privacy and Trust = First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
HCI for Cybersecurity, Privacy and Trust/ edited by Abbas Moallem.
其他題名:
First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
其他作者:
Moallem, Abbas.
面頁冊數:
XIX, 484 p. 292 illus., 131 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Cryptology. -
電子資源:
https://doi.org/10.1007/978-3-030-22351-9
ISBN:
9783030223519
HCI for Cybersecurity, Privacy and Trust = First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
HCI for Cybersecurity, Privacy and Trust
First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /[electronic resource] :edited by Abbas Moallem. - 1st ed. 2019. - XIX, 484 p. 292 illus., 131 illus. in color.online resource. - Information Systems and Applications, incl. Internet/Web, and HCI ;11594. - Information Systems and Applications, incl. Internet/Web, and HCI ;9149.
Authentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- Privacy Preserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.
ISBN: 9783030223519
Standard No.: 10.1007/978-3-030-22351-9doiSubjects--Topical Terms:
1211076
Cryptology.
LC Class. No.: QA76.9.U83
Dewey Class. No.: 005.437
HCI for Cybersecurity, Privacy and Trust = First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
LDR
:04821nam a22004335i 4500
001
1013504
003
DE-He213
005
20200706211350.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030223519
$9
978-3-030-22351-9
024
7
$a
10.1007/978-3-030-22351-9
$2
doi
035
$a
978-3-030-22351-9
050
4
$a
QA76.9.U83
050
4
$a
QA76.9.H85
072
7
$a
UYZG
$2
bicssc
072
7
$a
COM070000
$2
bisacsh
072
7
$a
UYZG
$2
thema
082
0 4
$a
005.437
$2
23
082
0 4
$a
4.019
$2
23
245
1 0
$a
HCI for Cybersecurity, Privacy and Trust
$h
[electronic resource] :
$b
First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings /
$c
edited by Abbas Moallem.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XIX, 484 p. 292 illus., 131 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
11594
505
0
$a
Authentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- Privacy Preserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions.
520
$a
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.
650
2 4
$a
Cryptology.
$3
1211076
650
0
$a
User interfaces (Computer systems).
$3
1253526
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Application software.
$3
528147
650
0
$a
Computers.
$3
565115
650
1 4
$a
User Interfaces and Human Computer Interaction.
$3
669793
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Security Services.
$3
1211616
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Computing Milieux.
$3
669921
700
1
$a
Moallem, Abbas.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1222030
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030223502
776
0 8
$i
Printed edition:
$z
9783030223526
830
0
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
9149
$3
1253558
856
4 0
$u
https://doi.org/10.1007/978-3-030-22351-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入