LEADER 03076nam 2200493 450 001 996542667903316 005 20231212110928.0 010 $a3-031-35822-8 024 7 $a10.1007/978-3-031-35822-7 035 $a(MiAaPQ)EBC30622155 035 $a(Au-PeEL)EBL30622155 035 $a(DE-He213)978-3-031-35822-7 035 $a(PPN)272249696 035 $a(EXLCZ)9927532076300041 100 $a20231212d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aHCI for Cybersecurity, Privacy and Trust $e5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings /$fedited by Abbas Moallem 205 $aFirst edition. 210 1$aCham, Switzerland :$cSpringer Nature Switzerland AG,$d[2023] 210 4$dİ2023 215 $a1 online resource (713 pages) 225 1 $aLecture Notes in Computer Science Series ;$vVolume 14045 311 08$aPrint version: Moallem, Abbas HCI for Cybersecurity, Privacy and Trust Cham : Springer,c2023 9783031358210 320 $aIncludes bibliographical references and index. 327 $aUsable Security and Privacy -- Data Privacy, Sovereignty and Governance -- Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies -- User-Centered Perspectives on Privacy and Security in Digital Environments -- Human-Centric Cybersecurity: From Intrabody Signals to Incident Management. 330 $aThis proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today?s society, which is progressively becoming more intertwined with and dependent on interactive technologies. 410 0$aLecture notes in computer science ;$vVolume 14045. 606 $aComputer security$vCongresses 606 $aData encryption (Computer science)$vCongresses 615 0$aComputer security 615 0$aData encryption (Computer science) 676 $a005.8 702 $aMoallem$b Abbas 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996542667903316 996 $aHCI for Cybersecurity, Privacy and Trust$92201493 997 $aUNISA