My Account Log in

0 options

We are having trouble retrieving some holdings at the moment. Refresh the page to try again.

HCI for Cybersecurity, Privacy and Trust : Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings / edited by Abbas Moallem.

Format:
Book
Contributor:
Moallem, Abbas, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI ; SL 3, 12788
Information Systems and Applications, incl. Internet/Web, and HCI ; 12788
Language:
English
Subjects (All):
User interfaces (Computer systems).
Human-computer interaction.
Application software.
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks-Security measures.
Computer networks.
User Interfaces and Human Computer Interaction.
Computer and Information Systems Applications.
Data and Information Security.
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Local Subjects:
User Interfaces and Human Computer Interaction.
Computer and Information Systems Applications.
Data and Information Security.
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Physical Description:
1 online resource (XIX, 490 pages) : 97 illustrations, 67 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. HCI-CPT 2021 includes a total of 30 papers; they were organized in topical sections named: usable security; security and privacy by design; user behavior analysis in cybersecurity; and security and privacy awareness.
Contents:
Usable Security
Authentication Management of Home IoT Devices
Emics and Etics of Usable Security: Culturally Specific or Culturally Universal?
Development of a Novice-Friendly Representation of Camouflaged Boolean Networks
Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review
Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes
Risk Assessment of "Ostrich ZIP"
Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users
Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services
Security and Privacy by Design
Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience
A Human Factor Approach to Threat Modeling
Smart Technologies and Internet of Things Designed for Aging in Place
Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration
Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces
Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk
Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior
Privacy Design Strategies and the GDPR: A Systematic Literature Review
User Behavior Analysis in Cybersecurity
'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices
Perceptions of Security and Privacy in mHealth
Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
CyberPin - Challenges on Recognizing Youngest Cyber Talents
It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness
Understanding the Last Line of Defense: Human Response to Cybersecurity Events
Security and Privacy Awareness
The Effectiveness of Video Messaging Campaigns to Use 2FA
A Study on Online Businesses' Commitment to Consumer Privacy
Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks
Social Engineering Attacks: Recent Advances and Challenges
Brand Validation: Security Indicator to Better Indicate Website Identity
Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials
Gaming Apps' and Social Media Partnership: A Privacy Perspective.
Other Format:
Printed edition:
ISBN:
978-3-030-77392-2
9783030773922
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account