default search action
HCI 2024: Washington, DC, USA - Volume 45
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29 - July 4, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14728, Springer 2024, ISBN 978-3-031-61378-4
Cyber Hygiene, User Behavior and Security Awareness
- Eman Alashwali, Lorrie Cranor:
Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia. 3-29 - Arwa Binsedeeq, Steven Furnell, Xavier Carpent, Nicholas Gervassis:
Seek and Locate? Examining the Accessibility of Cybersecurity Features. 30-42 - Cameron Gray, Steven Furnell:
Enhancing Cyber Hygiene and Literacy via Interactive Mini-games. 43-52 - Alex Katsarakes, Thomas Morris, Jeremiah D. Still:
Hidden in Onboarding: Cyber Hygiene Training and Assessment. 53-63 - Paola Marmorato, Clarissa Fernandes, Lydia Kraus, Elizabeth Stobert:
"I'm not planning on dying anytime soon!": A Survey of Digital Legacy Planning. 64-76 - Suzanne Prior, Karen Renaud:
Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities? 77-96 - Deborah Taylor, Clare Melvin, Hane Aung, Rameez Asif:
To Bot or Not to Bot?: Analysing Mental Health Data Disclosures. 97-115 - Ezgi Tugcu, Steven Furnell:
Exploring User Understanding of Wireless Connectivity and Security on Smartphones. 116-125 - Rick van der Kleij, Tineke Hof:
Why Do Organizations Fail to Practice Cyber Resilience? 126-137 - Tafheem Ahmad Wani, Antonette Mendoza, Kathleen Gray:
BYOD Security Practices in Australian Hospitals - A Qualitative Study. 138-158
User Privacy and Security Acceptance
- Nanik Prasetyoningsih, Nazli Ismail Nawang, Windy Virdinia Putri, Muhammad Nur Rifqi Amirullah:
Legal Protection for the Personal Data in Indonesia and Malaysia. 161-169 - Samiah Alghamdi, Steven Furnell, Steven R. Bagley:
Towards a Harmonised Approach for Security and Privacy Management in Smart Home Contexts. 170-187 - Yomna Aly, Cosmin Munteanu:
Privacy-Conscious Design Requirements to Support Older Adults' Health Information Seeking. 188-211 - Daniela Azevedo, Justine Ramelot, Axel Legay, Suzanne Kieffer:
With or Without U(sers): A Journey to Integrate UX Activities in Cybersecurity. 212-231 - David Brookshire Conner:
Using a Digital Transformation to Improve Enterprise Security - A Case Study. 232-244 - Sachiko Kanamori, Miho Ikeda, Kumiko Kameishi, Ayako Akiyama Hasegawa:
Japanese Users' (Mis)understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law. 245-264 - Jing Luo, Xin Zhang, Fang Fu, Hanxiao Geng:
Alert Interaction Service Design for AI Face Swap Video Scams. 265-280 - Sanjay Misra, Kousik Barik, Harald P.-J. Thunem, Sabarathinam Chockalingam:
Human Factors and Security in Digital Twins: Challenges and Future Prospects. 281-295 - Benjamin L. Schooley, Derek Hansen, Ethan James Richmond, Malaya Jordan Canite, Nimrod Max Huaira Reyna:
Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images. 296-317
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.