語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Human Aspects of Information Securit...
~
Tryfonas, Theo.
Human Aspects of Information Security, Privacy, and Trust = 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Human Aspects of Information Security, Privacy, and Trust/ edited by Theo Tryfonas.
其他題名:
4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
其他作者:
Tryfonas, Theo.
面頁冊數:
XV, 289 p. 83 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computers. -
電子資源:
https://doi.org/10.1007/978-3-319-39381-0
ISBN:
9783319393810
Human Aspects of Information Security, Privacy, and Trust = 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
Human Aspects of Information Security, Privacy, and Trust
4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /[electronic resource] :edited by Theo Tryfonas. - 1st ed. 2016. - XV, 289 p. 83 illus.online resource. - Information Systems and Applications, incl. Internet/Web, and HCI ;9750. - Information Systems and Applications, incl. Internet/Web, and HCI ;9149.
User Identification Using Games -- Hermes: Hands-Free Authentication in Physical Spaces -- Implicit Authentication for Mobile Devices Using Typing Behavior -- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials -- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices -- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud -- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011 -- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks -- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Personal Health Information Act -- Information Security Application Design: Understanding Your Users -- Responsibility Modelling and Its Application Trust Management -- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks -- Current Trend of End-users’ Behaviors towards Security Mechanisms -- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology -- The Impact of Security Cues on User Perceived Security in E-Commerce -- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks -- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective -- Assessing the Feasibility of Adaptive Security Models for the Internet of Things -- OpenStack Firewall as a Service Rule Analyser -- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes -- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle -- The State of Near-Field Communication (NFC) on the Android platform -- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home -- A Taxonomy to Classify Risk End-user Profile in Interaction with the Computing Environment -- Security Middleware Programming Using P4.
This book constitutes the proceedings of the 4th International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016 and received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 25 papers presented in the HAS 2016 proceedings are organized in topical sections as follows: human factors of authentication; security, privacy, and human behavior; and security technologies.
ISBN: 9783319393810
Standard No.: 10.1007/978-3-319-39381-0doiSubjects--Topical Terms:
565115
Computers.
LC Class. No.: QA75.5-76.95
Dewey Class. No.: 005.743
Human Aspects of Information Security, Privacy, and Trust = 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
LDR
:04555nam a22004095i 4500
001
981437
003
DE-He213
005
20200702092959.0
007
cr nn 008mamaa
008
201211s2016 gw | s |||| 0|eng d
020
$a
9783319393810
$9
978-3-319-39381-0
024
7
$a
10.1007/978-3-319-39381-0
$2
doi
035
$a
978-3-319-39381-0
050
4
$a
QA75.5-76.95
072
7
$a
UY
$2
bicssc
072
7
$a
COM069000
$2
bisacsh
072
7
$a
UY
$2
thema
082
0 4
$a
005.743
$2
23
245
1 0
$a
Human Aspects of Information Security, Privacy, and Trust
$h
[electronic resource] :
$b
4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
$c
edited by Theo Tryfonas.
250
$a
1st ed. 2016.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
XV, 289 p. 83 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
9750
505
0
$a
User Identification Using Games -- Hermes: Hands-Free Authentication in Physical Spaces -- Implicit Authentication for Mobile Devices Using Typing Behavior -- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials -- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices -- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud -- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011 -- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks -- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Personal Health Information Act -- Information Security Application Design: Understanding Your Users -- Responsibility Modelling and Its Application Trust Management -- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks -- Current Trend of End-users’ Behaviors towards Security Mechanisms -- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology -- The Impact of Security Cues on User Perceived Security in E-Commerce -- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks -- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective -- Assessing the Feasibility of Adaptive Security Models for the Internet of Things -- OpenStack Firewall as a Service Rule Analyser -- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes -- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle -- The State of Near-Field Communication (NFC) on the Android platform -- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home -- A Taxonomy to Classify Risk End-user Profile in Interaction with the Computing Environment -- Security Middleware Programming Using P4.
520
$a
This book constitutes the proceedings of the 4th International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016 and received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 25 papers presented in the HAS 2016 proceedings are organized in topical sections as follows: human factors of authentication; security, privacy, and human behavior; and security technologies.
650
0
$a
Computers.
$3
565115
650
0
$a
Computer security.
$3
557122
650
0
$a
User interfaces (Computer systems).
$3
1253526
650
0
$a
Management information systems.
$3
561123
650
0
$a
Computer science.
$3
573171
650
0
$a
Information storage and retrieval.
$3
1069252
650
0
$a
Application software.
$3
528147
650
1 4
$a
Models and Principles.
$3
669634
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
669793
650
2 4
$a
Management of Computing and Information Systems.
$3
593928
650
2 4
$a
Information Storage and Retrieval.
$3
593926
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
700
1
$a
Tryfonas, Theo.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1067039
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319393803
776
0 8
$i
Printed edition:
$z
9783319393827
830
0
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
9149
$3
1253558
856
4 0
$u
https://doi.org/10.1007/978-3-319-39381-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入