LEADER 04649nam 22007935 450 001 9910483260503321 005 20200701100922.0 010 $a3-642-39345-4 024 7 $a10.1007/978-3-642-39345-7 035 $a(CKB)3710000000002626 035 $a(DE-He213)978-3-642-39345-7 035 $a(SSID)ssj0000962802 035 $a(PQKBManifestationID)11525896 035 $a(PQKBTitleCode)TC0000962802 035 $a(PQKBWorkID)10976129 035 $a(PQKB)10664295 035 $a(MiAaPQ)EBC3101166 035 $a(PPN)172428122 035 $a(EXLCZ)993710000000002626 100 $a20130703d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Aspects of Information Security, Privacy and Trust$b[electronic resource] $eFirst International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings /$fedited by Louis Marinos, Ioannis Askoxylakis 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XX, 378 p. 102 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8030 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-39344-6 327 $aNovel authentication systems -- Human factors in security -- Security and privacy policies -- User centric security and privacy. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8030 606 $aUser interfaces (Computer systems) 606 $aComputer security 606 $aE-commerce 606 $aComputers and civilization 606 $aApplication software 606 $aInformation storage and retrieval 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Applications$3https://scigraph.springernature.com/ontologies/product-market-codes/I23001 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 615 0$aUser interfaces (Computer systems). 615 0$aComputer security. 615 0$aE-commerce. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 14$aUser Interfaces and Human Computer Interaction. 615 24$aSystems and Data Security. 615 24$ae-Commerce/e-business. 615 24$aComputers and Society. 615 24$aComputer Applications. 615 24$aInformation Storage and Retrieval. 676 $a029.7 702 $aMarinos$b Louis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAskoxylakis$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483260503321 996 $aHuman Aspects of Information Security, Privacy and Trust$92589705 997 $aUNINA