default search action
HCI 2020: Copenhagen, Denmark
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings. Lecture Notes in Computer Science 12210, Springer 2020, ISBN 978-3-030-50308-6
Human Factors in Cybersecurity
- May Almousa, Mahsa Keshavarz, Mohd Anwar:
Awareness and Working Knowledge of Secure Design Principles: A User Study. 3-15 - Hamed AlQahtani, Manolya Kavakli-Thorne, Majed Abdullah Alrowaily:
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR). 16-31 - Hamed AlQahtani, Manolya Kavakli-Thorne:
Does Decision-Making Style Predict Individuals' Cybersecurity Avoidance Behaviour? 32-50 - Laura M. Bishop, Phillip L. Morgan, Phoebe M. Asquith, George Raywood-Burke, Adam Wedgbury, Kevin Jones:
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design. 51-66 - David Blank, Ravi Kanth Kosuru:
Building Connections for a Secure User Experience. 67-75 - John M. Blythe, Alan Gray, Emily Collins:
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change? 76-91 - Kingberli Capellan, Manuel Condado, Isabel Morais, Patricia Morreale:
Analyzing Cybersecurity Understanding Using a Brain Computer Interface. 92-104 - Lynne M. Coventry, Dawn Branley-Bell, Elizabeth Sillence, Sabina Magalini, Pasquale Mari, Aimilia Magkanaraki, Kalliopi Anastasopoulou:
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour. 105-122 - Lauren S. Ferro, Francesco Sapio:
Another Week at the Office (AWATO) - An Interactive Serious Game for Threat Modeling Human Factors. 123-142 - Laheem Khan, Kovila P. L. Coopamootoo, Magdalene Ng:
Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice. 143-161 - Patrik Lif, Jacob Löfvenberg, Per Wikberg, Ove Jansson:
Development of a Test Battery for Cyber Soldiers. 162-174 - Birgy Lorenz, Kaido Kikkas:
"Trust Me, You Will Need It": Cybersecurity as Extracurricular Subject at Estonian Schools. 175-188 - Heather Molyneaux, Elizabeth Stobert, Irina Kondratova, Manon Gaudet:
Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors. 189-205 - Phillip L. Morgan, Phoebe M. Asquith, Laura M. Bishop, George Raywood-Burke, Adam Wedgbury, Kevin Jones:
A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations. 206-216 - Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity? 217-231 - Andrew Reeves, Kathryn Parsons, Dragana Calic:
Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness? 232-249 - Luis Martín Sánchez-Adame, Sonia Mendoza, Beatriz A. González-Beltrán, Amilcar Meneses-Viveros, José Rodríguez:
The Man in the Besieged Castle: Heuristic Evaluation of Home Security Systems. 250-260 - Artem Voronkov, Leonardo A. Martucci:
Natural vs. Technical Language Preference and Their Impact on Firewall Configuration. 261-270 - Adam Wójtowicz, Jacek Chmielewski:
Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce. 271-284
Privacy and Trust
- Panagiotis Andriotis, Atsuhiro Takasu:
To Allow, or Deny? That is the Question. 287-304 - George Chalhoub, Ivan Flechais:
"Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users. 305-325 - Susen Döbelt, Josephine Halama, Sebastian Fritsch, Minh-Hoang Nguyen, Franziska Bocklisch:
Clearing the Hurdles: How to Design Privacy Nudges for Mobile Application Users. 326-353 - Denis Feth:
Modelling and Presentation of Privacy-Relevant Information for Internet Users. 354-366 - Shadan Ghaffaripour, Ali Miri:
Enabling Medical Research Through Privacy-Preserving Data Markets. 367-380 - Charulata Ghosh, Matthew S. Eastin:
Understanding Users' Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior. 381-392 - Julie M. Haney, Susanne M. Furman, Yasemin Acar:
Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. 393-411 - Sarah A. Jessup, Gene M. Alarcon, August A. Capiola, Tyler J. Ryan:
Multi-method Approach Measuring Trust, Distrust, and Suspicion in Information Technology. 412-426 - Edden Kashi, Angeliki Zavou:
Did I Agree to This? Silent Tracking Through Beacons. 427-444 - Holger Koelmann:
Perspectives on Information Technology Artefacts in Trust-Related Interactions. 445-457 - Kaur Kullman, Laurin Buchanan, Anita Komlodi, Don Engel:
Mental Model Mapping Method for Cybersecurity. 458-470 - Suzanne Prior, Natalie Coull:
Parents Unwittingly Leak Their Children's Data: A GDPR Time Bomb? 471-486 - Fatema Rashid, Ali Miri:
An Emerging Strategy for Privacy Preserving Databases: Differential Privacy. 487-498 - Kirsten E. Richards:
Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability. 499-512 - Eva-Maria Schomakers, Hannah Biermann, Martina Ziefle:
Understanding Privacy and Trust in Smart Home Environments. 513-532 - Tanusree Sharma, Masooda N. Bashir:
Privacy Apps for Smartphones: An Assessment of Users' Preferences and Limitations. 533-546 - Rodolfo Ward, Cleomar Rocha, Suzete Venturelli:
Cyberspace and Cyberculture: The New Social and Governance Field. 547-557
Usable Security Approaches
- Kokoro Kobayashi, Tsuyoshi Oguni, Masaki Nakagawa:
Evaluation of Secure Pad Resilient to Shoulder Hacking. 561-574 - Michael Kubach, Heiko Roßnagel:
Smart Assistants in IT Security - An Approach to Addressing the Challenge by Leveraging Assistants' Specific Features. 575-587 - Wei Li, Shuping Yi, Qian Yi, Jiajia Li, Shiquan Xiong:
An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication. 588-598 - Jens Mehrfeld:
Cyber Security Threats and Incidents in Industrial Control Systems. 599-608 - Bilal Naqvi, Jari Porras:
Usable Security by Design: A Pattern Approach. 609-618 - Katie Paxton-Fear, Duncan Hodges, Oliver Buckley:
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks. 619-636 - Emanuel Schmitt, Jan-Niklas Voigt-Antons:
Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor Readings. 637-651 - Akihiro Tachikawa, Akira Kanaoka:
Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions. 652-670 - Yuhan Wang, Qian Yi, Shuping Yi, Jiajia Li, Shiquan Xiong:
Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network. 671-682
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.