03078nam 2200493 450 991073486420332120231212110928.03-031-35822-810.1007/978-3-031-35822-7(MiAaPQ)EBC30622155(Au-PeEL)EBL30622155(DE-He213)978-3-031-35822-7(PPN)272249696(EXLCZ)992753207630004120231212d2023 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHCI for Cybersecurity, Privacy and Trust 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings /edited by Abbas MoallemFirst edition.Cham, Switzerland :Springer Nature Switzerland AG,[2023]©20231 online resource (713 pages)Lecture Notes in Computer Science Series ;Volume 14045Print version: Moallem, Abbas HCI for Cybersecurity, Privacy and Trust Cham : Springer,c2023 9783031358210 Includes bibliographical references and index.Usable Security and Privacy -- Data Privacy, Sovereignty and Governance -- Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies -- User-Centered Perspectives on Privacy and Security in Digital Environments -- Human-Centric Cybersecurity: From Intrabody Signals to Incident Management.This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.Lecture notes in computer science ;Volume 14045.Computer securityCongressesData encryption (Computer science)CongressesComputer securityData encryption (Computer science)005.8Moallem AbbasMiAaPQMiAaPQMiAaPQBOOK9910734864203321HCI for Cybersecurity, Privacy and Trust3403614UNINA