LEADER 04088nam 22007455 450 001 996418309703316 005 20210414122155.0 010 $a3-030-50309-7 024 7 $a10.1007/978-3-030-50309-3 035 $a(CKB)4100000011343413 035 $a(DE-He213)978-3-030-50309-3 035 $a(MiAaPQ)EBC6273274 035 $a(PPN)254984207 035 $a(EXLCZ)994100000011343413 100 $a20200625d2020 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHCI for Cybersecurity, Privacy and Trust$b[electronic resource] $eSecond International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19?24, 2020, Proceedings /$fedited by Abbas Moallem 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XX, 684 p. 193 illus., 113 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v12210 300 $aRefereed/Peer-reviewed 311 $a3-030-50308-9 327 $aHuman Factors in Cybersecurity -- Privacy and Trust -- Usable Security Approaches. 330 $aThis book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. HCI-CPT 2020 includes a total of 45 regular papers; they were organized in topical sections named: human factors in cybersecurity; privacy and trust; usable security approaches. As a result of the Danish Government's announcement, dated April21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually. . 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v12210 606 $aUser interfaces (Computer systems) 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aCoding theory 606 $aInformation theory 606 $aUser Interfaces and Human Computer Interaction$3https://scigraph.springernature.com/ontologies/product-market-codes/I18067 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aUser interfaces (Computer systems). 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aUser Interfaces and Human Computer Interaction. 615 24$aMobile and Network Security. 615 24$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 676 $a005.8 702 $aMoallem$b Abbas$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418309703316 996 $aHCI for Cybersecurity, Privacy and Trust$92201493 997 $aUNISA