default search action
HCI 2021: Virtual Event
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings. Lecture Notes in Computer Science 12788, Springer 2021, ISBN 978-3-030-77391-5
Usable Security
- Aniqa Alam, Heather Molyneaux, Elizabeth Stobert:
Authentication Management of Home IoT Devices. 3-21 - Aniqa Alam, Robert Biddle, Elizabeth Stobert:
Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal? 22-40 - Salsabil Hamadache, Malte Elson:
Development of a Novice-Friendly Representation of Camouflaged Boolean Networks. 41-49 - Aimee Kendall Roundtree:
Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review. 50-65 - Pantelitsa Leonidou, Argyris Constantinides, Marios Belk, Christos Fidas, Andreas Pitsillides:
Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes. 66-75 - Michihiro Nakayama, Akira Kanaoka:
Risk Assessment of "Ostrich ZIP". 76-90 - Biao Wang, Zhengang Zhai, Bingtao Gao, Li Zhang:
Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users. 91-102 - Daniel Wilusz, Adam Wójtowicz:
Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services. 103-119
Security and Privacy by Design
- Nicola Fairburn, Andrew Shelton, Frances Ackroyd, Rachel Selfe:
Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience - An Applied Practice Case Study Discussing Approaches to Assessing Human Factors Vulnerabilities in Cyber-Security Systems. 123-138 - Lauren S. Ferro, Andrea Marrella, Tiziana Catarci:
A Human Factor Approach to Threat Modeling. 139-157 - Hélène Fournier, Irina Kondratova, Keiko Katsuragawa:
Smart Technologies and Internet of Things Designed for Aging in Place. 158-176 - Jongkeon Kim, Jeongyun Heo:
Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration. 177-193 - Karsten Martiny, Mark F. St. John, Grit Denker, Christopher Korkos, Linda Briesemeister:
Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces. 194-211 - Chris Nichols, Geoff Stoker, Ulku Clark:
Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk. 212-225 - George Raywood-Burke, Laura M. Bishop, Phoebe M. Asquith, Phillip L. Morgan:
Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior. 226-240 - Marco Saltarella, Giuseppe Desolda, Rosa Lanzilotti:
Privacy Design Strategies and the GDPR: A Systematic Literature Review. 241-257
User Behavior Analysis in Cybersecurity
- Zainab Agha, Reza Ghaiumy Anaraky, Karla A. Badillo-Urquiola, Bridget Christine McHugh, Pamela J. Wisniewski:
'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure. 261-280 - Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas:
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices. 281-296 - Ana Ferreira, Joana Muchagata, Pedro Vieira-Marques, Diogo Abrantes, Soraia Teles:
Perceptions of Security and Privacy in mHealth. 297-309 - Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen:
Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account. 310-325 - Birgy Lorenz, Kaido Kikkas, Aleksei Talisainen, Taavi Eomäe:
CyberPin - Challenges on Recognizing Youngest Cyber Talents. 326-336 - John Brian Pickering, Costas Boletsis, Ragnhild Halvorsrud, Stephen C. Phillips, Mike Surridge:
It's Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness. 337-352 - Summer Rebensky, Meredith B. Carroll, Andrew Nakushian, Maria Chaparro, Tricia Prior:
Understanding the Last Line of Defense: Human Response to Cybersecurity Events. 353-366
Security and Privacy Awareness
- Elham Al Qahtani, Lipsarani Sahoo, Mohamed Shehab:
The Effectiveness of Video Messaging Campaigns to Use 2FA. 369-390 - May Almousa, Yang Liu, Tianyang Zhang, Mohd Anwar:
A Study on Online Businesses' Commitment to Consumer Privacy. 391-402 - Joseph Aneke, Carmelo Ardito, Giuseppe Desolda:
Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks. 403-416 - Nikol Mashtalyar, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak, Suprio Ray:
Social Engineering Attacks: Recent Advances and Challenges. 417-431 - Tetsuya Okuda, Naoko Chiba, Mitsuaki Akiyama, Toshinori Fukunaga, Ryohei Suzuki, Masayuki Kanda:
Brand Validation: Security Indicator to Better Indicate Website Identity. 432-447 - Satoshi Ozaki, Hiroshi Furukawa:
Study on the Impact of Learning About Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials. 448-474 - Tian Wang, Masooda N. Bashir:
Gaming Apps' and Social Media Partnership: A Privacy Perspective. 475-487
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.