default search action
17th HCI 2015: Los Angeles, CA, USA
- Theo Tryfonas, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. Lecture Notes in Computer Science 9190, Springer 2015, ISBN 978-3-319-20375-1
Authentication
- Sarah N. Abdulkader, Ayman Atia, Mostafa-Sami M. Mostafa:
Single Trial Authentication with Mental Password Writing. 3-12 - Alexander Chan, Tzipora Halevi, Nasir D. Memon:
Leap Motion Controller for Authentication via Hand Geometry and Gestures. 13-22 - Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. 23-35 - Ana Ferreira, Lynne M. Coventry, Gabriele Lenzini:
Principles of Persuasion in Social Engineering and Their Use in Phishing. 36-47 - Masahiro Fujita, Yuki Ikeya, Junya Kani, Masakatsu Nishigaki:
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objects. 48-58 - Kristen K. Greene:
Effects of Password Permutation on Subjective Usability Across Platforms. 59-70 - Kat Krol, Constantinos Papanicolaou, Alexei Vernitski, Martina Angela Sasse:
"Too Taxing on the Mind!" Authentication Grids are not for Everyone. 71-82 - Paul Y. Lee, Yee-Yin Choong:
Human Generated Passwords - The Impacts of Password Requirements and Presentation Styles. 83-94 - Cathryn A. Ploehn, Kristen K. Greene:
The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords. 95-106 - Lakshmidevi Sreeramareddy, Pewu Mulbah, Jinjuan Heidi Feng:
Investigating the Use of Gesture-Based Passwords by the Seniors. 107-118 - Michelle Steves, Mary Theofanos, Celia Paulsen, Athos Ribeiro:
Password Policy Languages: Usable Translation from the Informal to the Formal. 119-130 - Abrar Ullah, Hannan Xiao, Trevor Barker:
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication. 131-140
Cybersecurity
- François-Xavier Aguessy, Olivier Bettan, Romuald Dobigny, Claire Laudy, Gaëlle Lortal, David Faure:
Adjustable Fusion to Support Cyber Security Operators. 143-153 - Stefan Bauer, Edward W. N. Bernroider:
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring. 154-164 - Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. 165-177 - Taolue Chen, Florian Kammüller, Ibrahim Nemli, Christian W. Probst:
A Probabilistic Analysis Framework for Malicious Insider Threats. 178-189 - Zdenek Eichler, Radek Oslejsek, Dalibor Toth:
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environment. 190-199 - Shelby Hopkins, Andrew Wilson, Austin Silva, J. Chris Forsythe:
Factors Contributing to Performance for Cyber Security Forensic Analysis. 200-206 - Georgios Makrodimitris, Christos Douligeris:
Towards a Successful Exercise Implementation - A Case Study of Exercise Methodologies. 207-218 - Spyridon Papastergiou, Nineta Polemi, Athanasios Karantjias:
CYSM: An Innovative Physical/Cyber Security Management System for Ports. 219-230 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:
Factors that Influence Information Security Behavior: An Australian Web-Based Study. 231-241 - Dana Polatin-Reuben:
Pervasive Monitoring as an Insider Threat - An Adapted Model. 242-251 - Christian Sillaber, Ruth Breu:
Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis. 252-259 - Sandra Spickard Prettyman, Susanne Furman, Mary Theofanos, Brian C. Stanton:
Privacy and Security in the Brave New World: The Use of Multiple Mental Models. 260-270 - Shenja van der Graaf, Wim Vanobberghen, Michalis Kanakakis, Costas Kalogiros:
Usable Trust: Grasping Trust Dynamics for Online Security as a Service. 271-283
Privacy, Security and User Behaviour
- Nasser O. Alshammari, Alexios Mylonas, Mohamed H. Sedky, Justin Champion, Carolin Bauer:
Exploring the Adoption of Physical Security Controls in Smartphones. 287-298 - Yee-Yin Choong, Mary Theofanos:
What 4, 500+ People Can Tell You - Employees' Attitudes Toward Organizational Password Policy Do Matter. 299-310 - Shruti Devaraj, Myrtede Alfred, Kapil Chalil Madathil, Anand K. Gramopadhye:
An Investigation of the Factors that Predict an Internet User's Perception of Anonymity on the Web. 311-322 - Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks. 323-334 - Yasser M. Hausawi, William H. Allen:
Usable-Security Evaluation. 335-346 - Thomas Hughes-Roberts:
Reminding Users of their Privacy at the Point of Interaction: The Effect of Privacy Salience on Disclosure Behaviour. 347-356 - Costas Kalogiros, Michalis Kanakakis, Shenja van der Graaf, Wim Vanobberghen:
Profit-Maximizing Trustworthiness Level of Composite Systems. 357-368 - Lotus Lee, Jeremiah D. Still:
Re-designing Permission Requirements to Encourage BYOD Policy Adherence. 369-378 - Shancang Li, Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, Robert Ludwiniak, Gordon Russell:
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. 379-390 - Marília Soares Mendes, Elizabeth Furtado, Guido Militao, Miguel F. de Castro:
Hey, I Have a Problem in the System: Who Can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy Problems. 391-403 - Huw Read, Konstantinos Xynos, Iain Sutherland, Frode Roarson, Panagiotis Andriotis, George C. Oikonomou:
An Extensible Platform for the Forensic Analysis of Social Media Data. 404-414 - David Schuster, Mary L. Still, Jeremiah D. Still, Ji Jung Lim, Cary S. Feria, Christian P. Rohrer:
Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security. 415-425 - Mythreya Seetharama, Volker Paelke, Carsten Röcker:
SafetyPIN: Secure PIN Entry Through Eye Tracking. 426-435 - Emad Sherif, Steven Furnell, Nathan L. Clarke:
An Identification of Variables Influencing the Establishment of Information Security Culture. 436-448 - Patricia Cristiane de Souza, Cristiano Maciel:
Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective. 449-460
Security in Social Media and Smart Technologies
- Claudia Z. Acemyan, Philip T. Kortum, Michael D. Byrne, Dan S. Wallach:
Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II. 463-474 - Panagiotis Andriotis, George C. Oikonomou:
Messaging Activity Reconstruction with Sentiment Polarity Identification. 475-486 - Chris S. Crawford, Naja A. Mack, Wanda Eugene, Juan E. Gilbert:
Televoting: Secure, Overseas Voting. 487-494 - Shaneé Dawkins, Sharon J. Laskowski:
Personalized Voting: The Intersection of Cloud and Mobility. 495-505 - John Haggerty, Thomas Hughes-Roberts, Robert Hegarty:
Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices. 506-516 - Elahe Kani-Zabihi, Lizzie Coles-Kemp, Martin Helmhout:
Information Presentation: Considering On-line User Confidence for Effective Engagement. 517-525 - Ella Kolkowska:
Privacy Principles in Design of Smart Homes Systems in Elderly Care. 526-537 - Noluntu Mpekoa, Aaron Bere:
An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting System. 538-546 - Alexander Novotny:
Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual Integrity. 547-558 - Whitney Quesenbery, Dana Chisnell:
Poll Workers and Election Integrity: Security as if People Mattered. 559-569 - Teresa Schmidt, Ralf Philipsen, Martina Ziefle:
From V2X to Control2Trust - Why Trust and Control Are Major Attributes in Vehicle2X Technologies. 570-581 - Sarah J. Swierenga, Rebecca S. Zantjer, James E. Jackson, Jennifer Ismirle, Stephen R. Blosser, Graham L. Pierce:
Security Implications for Personal Assistive Technology in Voting. 582-591 - Wiktoria Wilkowska, Martina Ziefle, Simon Himmel:
Perceptions of Personal Privacy in Smart Home Technologies: Do User Assessments Vary Depending on the Research Method? 592-603
Security Technologies
- Chrysovalandis Agathangelou, Chryssis Georgiou, Ileana Papailiou, Anna Philippou, Loucas Pouis, Georgios Tertytchny, Despina Vakana:
Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri Nets. 607-618 - Konstantinos Fysarakis, George Hatzivasilis, Ioannis G. Askoxylakis, Charalampos Manifavas:
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems. 619-630 - Ulrike Hugl:
Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime Research. 631-641 - Spyridon Papastergiou, Nineta Polemi, Ioannis Papagiannopoulos:
Business and Threat Analysis of Ports' Supply Chain Services. 642-653 - Teresa Susana Mendes Pereira, Henrique Santos:
Insider Threats: The Major Challenge to Security Risk Management. 654-663 - Brian C. Stanton, Mary Theofanos, Karuna P. Joshi:
Framework for Cloud Usability. 664-671 - George Stergiopoulos, Marianthi Theocharidou, Dimitris Gritzalis:
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures. 672-683 - Iain Sutherland, Theodoros Spyridopoulos, Huw Read, Andy Jones, Graeme Sutherland, Mikhailia Burgess:
Applying the ACPO Guidelines to Building Automation Systems. 684-692 - Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel:
Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making. 693-704 - Nils Ulltveit-Moe, Henrik Nergaard, Terje Gjøsæter, Jennifer Betts:
XACML Privacy Policy Editor for Critical Infrastructures. 705-716
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.