LEADER 04592nam 22008535 450 001 9910483919503321 005 20200629123706.0 010 $a3-319-20376-2 024 7 $a10.1007/978-3-319-20376-8 035 $a(CKB)3710000000454146 035 $a(SSID)ssj0001558531 035 $a(PQKBManifestationID)16182678 035 $a(PQKBTitleCode)TC0001558531 035 $a(PQKBWorkID)14818750 035 $a(PQKB)10056835 035 $a(DE-He213)978-3-319-20376-8 035 $a(MiAaPQ)EBC6294989 035 $a(MiAaPQ)EBC5577111 035 $a(Au-PeEL)EBL5577111 035 $a(OCoLC)915137544 035 $a(PPN)187688389 035 $a(EXLCZ)993710000000454146 100 $a20150720d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aHuman Aspects of Information Security, Privacy, and Trust $eThird International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings /$fedited by Theo Tryfonas, Ioannis Askoxylakis 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XVIII, 719 p. 206 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v9190 300 $aIncludes index. 311 $a3-319-20375-4 327 $aAuthentication -- Cybersecurity -- Privacy, security and user behaviour -- Security in social media and smart technologies -- Security Technologies. 330 $aThis book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v9190 606 $aComputers 606 $aApplication software 606 $aComputer communication systems 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aInformation technology 606 $aBusiness?Data processing 606 $aModels and Principles$3https://scigraph.springernature.com/ontologies/product-market-codes/I18016 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aIT in Business$3https://scigraph.springernature.com/ontologies/product-market-codes/522000 615 0$aComputers. 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aInformation technology. 615 0$aBusiness?Data processing. 615 14$aModels and Principles. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aIT in Business. 676 $a005.8 702 $aTryfonas$b Theo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAskoxylakis$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483919503321 996 $aHuman Aspects of Information Security, Privacy and Trust$92589705 997 $aUNINA