default search action
15th HCI 2013: Las Vegas, Nevada, USA
- Louis Marinos, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings. Lecture Notes in Computer Science 8030, Springer 2013, ISBN 978-3-642-39344-0
Novel Authentication Systems
- Sourav Bhuyan, Joel S. Greenstein, Kevin A. Juang:
Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal Security. 3-12 - Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems. 13-22 - Saul D. Costa, Dale R. Stevens, Jeremy A. Hansen:
Investigating an Intrusion Prevention System for Brain-Computer Interfaces. 23-28 - Ming-Chun Huang, Wenyao Xu, Jason J. Liu, Yi Su, Lei He, Majid Sarrafzadeh:
Inconspicuous Personal Computer Protection with Touch-Mouse. 29-38 - Junya Kani, Masakatsu Nishigaki:
Gamified CAPTCHA. 39-48 - Giuseppe Scardino, Ignazio Infantino, Filippo Vella:
Recognition of Human Identity by Detection of User Activity. 49-58 - Raquel Torres Peralta, Antons Rebguns, Ian R. Fasel, Kobus Barnard:
Learning a Policy for Gesture-Based Active Multi-touch Authentication. 59-68
Human Factors in Security
- Marios Belk, Panagiotis Germanakos, Christos Fidas, George Spanoudis, George Samaras:
Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA Mechanisms. 71-79 - Sadie Creese, Duncan Hodges, Sue Jamison-Powell, Monica T. Whitty:
Relationships between Password Choices, Perceptions of Risk and Security Expertise. 80-89 - Martin Hesseler, Gerhard Hartmann, Stefan Karsch:
Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust. 90-99 - Michaela Kauer, Sebastian Günther, Daniel Storck, Melanie Volkamer:
A Comparison of American and German Folk Models of Home Computer Security. 100-109 - Johanna Kluge, Martina Ziefle:
Health Is Silver, Beauty Is Golden? - How the Usage Context Influences the Acceptance of an Invasive Technology. 110-118 - Ayako Komatsu:
A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk - -The Case of Japanese Internet Users-. 119-126 - Tingya Kuo, Hung-Lian Tang:
Personality's Influence on Facebook's Privacy Settings: A Case of College Students in Taiwan. 127-134 - Ki Jung Lee, Il-Yeol Song:
An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social Networks. 135-144 - Celeste Lyn Paul, Kirsten Whitley:
A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation Awareness. 145-154 - Thomas Pfeiffer, Heike Theuerling, Michaela Kauer:
Click Me If You Can! - When Do Users Follow a Call to Action in an Online Message? 155-166 - Trenton Schulz, Ingvar Tjøstheim:
Increasing Trust Perceptions in the Internet of Things. 167-175 - Lynsay A. Shepherd, Jacqueline Archibald, Robert Ian Ferguson:
Perception of Risky Security Behaviour by Users: Survey of Current Approaches. 176-185 - Fuming Shih, Julia Boortz:
Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps. 186-196 - Martyn Styles:
Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats. 197-206
Security and Privacy Policies
- Kalliopi Anastasopoulou, Theo Tryfonas, Spyros Kokolakis:
Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps. 209-216 - Steven Furnell, Nina Bär:
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers. 217-225 - John D. Bustard:
Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring. 226-235 - Kathleen M. Hogan:
A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy. 236-245 - Michael Huth, Jim Huan-Pu Kuo, M. Angela Sasse, Iacovos Kirlappos:
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent. 246-255 - Kevin D. Jones, Kizito Salako:
Modeling Security Policy and the Effect for End-Users. 256-265 - Yinan Liu:
Legal Protection for Personal Information Privacy. 266-275 - Birgy Lorenz, Kaido Kikkas, Aare Klooster:
"The Four Most-Used Passwords Are Love, Sex, Secret, and God": Password Security and Training in Different User Groups. 276-283 - Shara Monteleone:
The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools. 284-294
User Centric Security and Privacy
- Scott W. Cadzow:
Addressing User Privacy and Experience in Distributed Long Lifetime Systems. 297-305 - Alexandros G. Fragkiadakis, Ioannis G. Askoxylakis, Elias Z. Tragos:
Secure and Energy-Efficient Life-Logging in Wireless Pervasive Environments. 306-315 - Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. 316-325 - Pavel Ocenasek, Jaromir Karmazin:
On the Secure and Safe Data Synchronization. 326-331 - Pavel Ocenasek:
The Practice of Global Internet Filtering. 332-337 - Nikolaos E. Petroulakis, Ioannis G. Askoxylakis, Apostolos Traganitis, George Spanoudakis:
A Privacy-Level Model of User-Centric Cyber-Physical Systems. 338-347 - Keunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, Dongho Won:
High-Level Design for a Secure Mobile Device Management System. 348-356 - Kenneth E. Stavinoha:
Factors Influencing Adoption of Encryption to Secure Data in the Cloud. 357-365 - Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis, Michalis Polychronakis, Georgios Portokalidis, Angelos D. Keromytis:
Cloudopsy: An Autopsy of Data Flows in the Cloud. 366-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.