04088nam 22007455 450 99641830970331620210414122155.03-030-50309-710.1007/978-3-030-50309-3(CKB)4100000011343413(DE-He213)978-3-030-50309-3(MiAaPQ)EBC6273274(PPN)254984207(EXLCZ)99410000001134341320200625d2020 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierHCI for Cybersecurity, Privacy and Trust[electronic resource] Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings /edited by Abbas Moallem1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (XX, 684 p. 193 illus., 113 illus. in color.)Information Systems and Applications, incl. Internet/Web, and HCI ;12210Refereed/Peer-reviewed3-030-50308-9 Human Factors in Cybersecurity -- Privacy and Trust -- Usable Security Approaches.This book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. HCI-CPT 2020 includes a total of 45 regular papers; they were organized in topical sections named: human factors in cybersecurity; privacy and trust; usable security approaches. As a result of the Danish Government's announcement, dated April21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually. .Information Systems and Applications, incl. Internet/Web, and HCI ;12210User interfaces (Computer systems)Computer networksSecurity measuresComputer securityData encryption (Computer science)Computer communication systemsCoding theoryInformation theoryUser Interfaces and Human Computer Interactionhttps://scigraph.springernature.com/ontologies/product-market-codes/I18067Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041User interfaces (Computer systems).Computer networksSecurity measures.Computer security.Data encryption (Computer science).Computer communication systems.Coding theory.Information theory.User Interfaces and Human Computer Interaction.Mobile and Network Security.Systems and Data Security.Cryptology.Computer Communication Networks.Coding and Information Theory.005.8Moallem Abbasedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418309703316HCI for Cybersecurity, Privacy and Trust2201493UNISA