default search action
HCI 2023: Copenhagen, Denmark - Volume 35
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings. Lecture Notes in Computer Science 14045, Springer 2023, ISBN 978-3-031-35821-0
Usable Security and Privacy
- Ala Sarah Alaqra, Simone Fischer-Hübner, Farzaneh Karegar:
Transparency of Privacy Risks Using PIA Visualizations. 3-17 - Marissa Berk, Tamara Marantika, Daan Oldenhof, Marcel Stalenhoef, Erik Hekman, Levien Nordeman, Simone van der Hof, Linda Louis, Aletta Smits, Koen van Turnhout:
Overcoming Privacy-Related Challenges for Game Developers. 18-28 - Yee-Yin Choong, Kerrianne Buchanan, Olivia Williams:
Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children's Password Practices. 29-48 - Wesam Fallatah, Steven Furnell, Ying He:
Refining the Understanding of Usable Security. 49-67 - Kazutoshi Itoh, Akira Kanaoka:
Survey of Services that Store Passwords in a Recoverable Manner. 68-77 - Akira Kanaoka:
(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy. 78-89 - Jaka Raharja, Achmad Nurmandi, Misran, Dimas Subekti:
Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH (Voter Data Information System) Application. 90-100 - Ankit Shrestha, Rizu Paudel, Prakriti Dumaru, Mahdi Nasrullah Al-Ameen:
Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of Rhetoric. 101-121
Data Privacy, Sovereignty and Governance
- Ruichen Cong, Yaping Ye, Jianlun Wu, Yuxi Li, Yuerong Chen, Yishan Bian, Kiichi Tago, Shoji Nishimura, Atsushi Ogihara, Qun Jin:
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental Validation. 125-134 - Denis Feth:
Usable Implementation of Data Sovereignty in Digital Ecosystems. 135-150 - Zimeng Gao, Fei Xing, Guochao Peng:
Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation. 151-162 - Julie M. Haney, Sandra Spickard Prettyman, Mary Frances Theofanos, Susanne M. Furman:
Data Guardians' Behaviors and Challenges While Caring for Others' Personal Data. 163-183 - Khutso Lebea, Wai Sze Leung:
A Privacy-Orientated Distributed Data Storage Model for Smart Homes. 184-193 - Luca Mazzola, Atreya Shankar, Christof Bless, Maria A. Rodriguez, Andreas Waldis, Alexander Denzler, Michiel Van Roey:
A Question Answering Tool for Website Privacy Policy Comprehension. 194-212 - Luisa Vervier, Philipp Brauner, Martina Ziefle:
Perception of Privacy and Willingness to Share Personal Data in the Smart Factory. 213-231 - Yenjou Wang, Ruichen Cong, Yixiao Liu, Kiichi Tago, Ruidong Li, Hitoshi Asaeda, Qun Jin:
Multi-ledger Coordinating Mechanism by Smart Contract for Individual-Initiated Trustworthy Data Sharing. 232-243
Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies
- Hebah A. Albatati, John A. Clark, Maysoon F. Abulkhair:
Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia. 247-261 - Yonas Zewdu Ayele, Sabarathinam Chockalingam, Nathan Lau:
Threat Actors and Methods of Attack to Social Robots in Public Spaces. 262-273 - Maria Bada, Steven Furnell, Jason R. C. Nurse, Jason Dymydiuk:
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies. 274-289 - Gordon J. Bruce:
Cybersecurity Compliance Requirements for USA Department of Defense Contractors - Dragons at the Gate. 290-308 - Arnoldas Budzys, Olga Kurasova, Viktor Medvedev:
Behavioral Biometrics Authentication in Critical Infrastructure Using Siamese Neural Networks. 309-322 - Victoria Marcinkiewicz, Phillip L. Morgan:
Trust and Blame in Self-driving Cars Following a Successful Cyber Attack. 323-337 - John Brian Pickering, Stephen C. Phillips, Gencer Erdogan:
I Just Want to Help: SMEs Engaging with Cybersecurity Technology. 338-352 - David Stevens, Richard Halverson:
Business Continuity Planning (BCP) for Election Systems. 353-367 - Joel Wilf:
Cybersecurity as Part of Mission Assurance. 368-377
User-Centered Perspectives on Privacy and Security in Digital Environments
- Rufai Ahmad, Sotirios Terzis, Karen Renaud:
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures. 381-398 - Abdulmajeed Alqhatani, Heather Richter Lipford:
Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness Trackers. 399-418 - Umai Balendra, Sana Maqsood:
User Motivations of Secure Web Browsing. 419-434 - Debasis Bhattacharya, Jodi Ito:
Working for Home - Privacy and Confidentiality Issues in University Education. 435-446 - Francisco Corella:
Overcoming the UX Challenges Faced by FIDO Credentials in the Consumer Space. 447-466 - Dandi Feng, Hiba Rafih, Cosmin Munteanu:
Understanding Older Adults' Safety Perceptions and Risk Mitigation Strategies when Accessing Online Services. 467-491 - Julie M. Haney, Susanne M. Furman:
Smart Home Device Loss of Support: Consumer Perspectives and Preferences. 492-510 - David Jones, Shiva Ghasemi, Denis Gracanin, Mohamed Azab:
Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users. 511-528 - Aysun Ogut:
"Stay Out of My Way!": The Impact of Cookie Consent Notice Design on Young Users' Decision. 529-541 - Hana Yousuf, Mostafa Al-Emran, Khaled Shaalan:
Evaluating Individuals' Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity Awareness. 542-554
Human-Centric Cybersecurity: From Intrabody Signals to Incident Management
- Nourah Alshomrani, Steven Furnell, Ying He:
Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings. 557-575 - Sabarathinam Chockalingam, Espen Nystad, Coralie Esnoul:
Capability Maturity Models for Targeted Cyber Security Training. 576-590 - Sukhi Chuhan, Veronica Wojnas:
Designing and Evaluating a Resident-Centric Digital Wallet Experience. 591-609 - Ulku Clark, Jeff Greer, Rahmira Rufus, Geoff Stoker:
A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use. 610-621 - Priscilla Kyei Danso, Heather Molyneaux, Alireza Zohourian, Euclides Carlos Pinto Neto, Derrick Whalen, Sajjad Dadkhah, Ali A. Ghorbani:
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment. 622-642 - Zeth Dubois, Roger T. Lew, Ronald L. Boring:
Fail-Safe Automatic Timed Response Protocol for Cyber Incident and Fault Management. 643-655 - Shodai Kurasaki, Akira Kanaoka:
Analysis of Country and Regional User Password Characteristics in Dictionary Attacks. 656-671 - Kasey Miller, Johnathan Mun:
Cyber Technologies, Machine Learning, Additive Manufacturing, and Cloud in the Box to Enable Optimized Maintenance Processes in Extreme Conditions. 672-684 - Isao Nakanishi, Tomoaki Oku, Souta Okasaka:
Person Verification Based on Multipoint Measurement of Intrabody Propagation Signals. 685-700
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.