top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings / / edited by Abbas Moallem
HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings / / edited by Abbas Moallem
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (713 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Series
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-031-35822-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Usable Security and Privacy -- Data Privacy, Sovereignty and Governance -- Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies -- User-Centered Perspectives on Privacy and Security in Digital Environments -- Human-Centric Cybersecurity: From Intrabody Signals to Incident Management.
Record Nr. UNINA-9910734864203321
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings / / edited by Abbas Moallem
HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings / / edited by Abbas Moallem
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (713 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Series
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-031-35822-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Usable Security and Privacy -- Data Privacy, Sovereignty and Governance -- Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies -- User-Centered Perspectives on Privacy and Security in Digital Environments -- Human-Centric Cybersecurity: From Intrabody Signals to Incident Management.
Record Nr. UNISA-996542667903316
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
HCI for cybersecurity, privacy and trust : 4th International Conference, HCI-CPT 2022 held as part of the 24th HCI International Conference, HCII 2022, Virtual event, June 26-July 1, 2022 proceedings / / Abbas Moallem (editor)
HCI for cybersecurity, privacy and trust : 4th International Conference, HCI-CPT 2022 held as part of the 24th HCI International Conference, HCII 2022, Virtual event, June 26-July 1, 2022 proceedings / / Abbas Moallem (editor)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (512 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-031-05563-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996478868503316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
HCI for cybersecurity, privacy and trust : 4th International Conference, HCI-CPT 2022 held as part of the 24th HCI International Conference, HCII 2022, Virtual event, June 26-July 1, 2022 proceedings / / Abbas Moallem (editor)
HCI for cybersecurity, privacy and trust : 4th International Conference, HCI-CPT 2022 held as part of the 24th HCI International Conference, HCII 2022, Virtual event, June 26-July 1, 2022 proceedings / / Abbas Moallem (editor)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (512 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-031-05563-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910568288903321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HCI for cybersecurity, privacy and trust : third International Conference, HCI-CPT 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021, proceedings / / Abbas Moallem, editor
HCI for cybersecurity, privacy and trust : third International Conference, HCI-CPT 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021, proceedings / / Abbas Moallem, editor
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (500 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-030-77392-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- HCI International 2021 Thematic Areas and Affiliated Conferences -- Contents -- Usable Security -- Authentication Management of Home IoT Devices -- 1 Introduction -- 2 Background -- 2.1 Security and Privacy Issues in Home IoT Devices -- 2.2 Usability of Home IoT Security -- 2.3 Authentication Challenges in Multi-user Smart Home Devices -- 3 Study -- 3.1 Survey Structure -- 3.2 Participants -- 4 Results -- 4.1 Security and Data Privacy Concern -- 4.2 Password Management of Home IoT Devices -- 4.3 Features for Home IoT Password Management -- 5 Discussion -- 5.1 Design Guidelines for an IoT Password Management Tool -- 5.2 Limitations and Future Work -- 6 Conclusion -- References -- Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal? -- 1 Introduction -- 2 Emics-Etics Framework for Usable Security: A Culture-Centric Framework to Address Usability Problems with Security Tools -- 3 When Security Emics Meets Etics: Culture-Specific Security Challenges -- 3.1 Software Piracy -- 3.2 Password Sharing -- 3.3 Mobile Phone Sharing -- 4 Discussion -- 4.1 Sharing as Cultural Norm and Necessity -- 4.2 Sharing in Business Strategy -- 4.3 Sharing in Technology Tools -- 5 Conclusion -- References -- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks -- 1 Introduction -- 1.1 Past Research -- 1.2 Present Research -- 1.3 Hypotheses -- 2 Development Process -- 3 Study Method -- 3.1 Participants -- 3.2 Procedure -- 4 Results and Implications -- 5 Conclusions and Future Research -- References -- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review -- 1 Introduction -- 1.1 Pervasiveness -- 1.2 Lingering Questions -- 1.3 Answering Questions with User Testing -- 2 Methods -- 3 Results -- 3.1 Included Studies -- 3.2 Study Participants -- 3.3 Study Methods.
3.4 Study Findings -- 3.5 Study Limitations -- 3.6 Study Quality -- 4 Conclusion -- References -- Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes -- 1 Introduction -- 2 User Study -- 2.1 Research Questions -- 2.2 Study Instruments -- 2.3 Sampling and Procedure -- 3 Analysis of Results -- 3.1 Differences in Time to the Solve Image-Recognition HIP Challenge Between Holistic and Analytic Users -- 3.2 Differences in Time to Visually Explore the Image During Solving the Image-Recognition HIP Challenge Between Holistic and Analytic Users -- 3.3 Differences in Eye Gaze Behavior During Solving the Image-Recognition HIP Challenge Between Holistic and Analytic Users -- 4 Main Findings -- 5 Conclusions and Future Work -- References -- Risk Assessment of ``Ostrich ZIP'' -- 1 Introduction -- 2 Organizing the Ostrich ZIP Discussion -- 2.1 Literature Review -- 2.2 Web Survey -- 2.3 Advantages of Ostrich ZIP -- 2.4 Disadvantages of Ostrich ZIP -- 2.5 The Ostrich ZIP Threats -- 2.6 Background of Ostrich ZIP Usage -- 2.7 Alternative Methods for Ostrich ZIP -- 3 Survey on the Current Status of the Ostrich ZIP -- 3.1 Specification -- 3.2 Encrypted ZIP Support in Typical Environments -- 3.3 Automatic Ostrich ZIP -- 4 Model of Information Leakage Events in File Sharing During E-Mail Sending and Receiving -- 4.1 Events Related to Information Leakage via E-Mail -- 4.2 Situation of E-Mail Use and Incidents of Information Leakage -- 4.3 Event Model and Simplified Probability of Leakage Occurrence for Each Leakage Case -- 5 Leakage Risk Assessment Using Event Models -- 6 Discussion -- 6.1 Information Leakage Risk and Usability -- 6.2 Discontinuation of the Use of TPE and the Effect of AES Support in Various Environments -- 6.3 Control of Information.
6.4 Reasons for Adopting Ostrich ZIP and Current Status -- 6.5 Overseas Trends -- 7 Conclusion -- References -- Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users -- 1 Introduction -- 2 Literature Review -- 2.1 Research on Identity Recognition Based on Network User Behavior -- 2.2 Classifiers Used in Existing Research -- 3 Methodology -- 3.1 Research on Hierarchical Behavior Characteristics of Network Users -- 3.2 Characteristics Fusion and Identity Recognition Methods -- 4 Experimental Analysis and Results -- 4.1 Experimental Analysis -- 4.2 Results -- 5 Limitations and Future Work -- 6 Conclusions -- References -- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services -- 1 Introduction -- 2 Emerging Transaction Authorization Methods -- 3 Threats to Transaction Authorization -- 4 Risk Analysis -- 5 Countermeasures -- 6 Conclusions -- References -- Security and Privacy by Design -- Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience -- 1 Introduction -- 1.1 Case Study -- 2 Recognised HF Approaches -- 2.1 HF Adoption of Formal Cyber-Security Methods -- 2.2 HF Practitioner Experience -- 2.3 Culture -- 2.4 Safety Assurance Applied to Security -- 3 Methods -- 4 Discussion -- 4.1 Iterative Model Development and Validation -- 4.2 Integrating Cyber and HF Approaches -- 4.3 Qualitative and Quantitative Methods -- 5 Conclusion -- References -- A Human Factor Approach to Threat Modeling -- 1 Introduction -- 2 Background and Related Work -- 2.1 Human Factors -- 2.2 Human Factors and Cybersecurity -- 2.3 Threat Modeling -- 3 STRIDE-HF -- 3.1 Implementing STRIDE-HF into an Interactive Experience: Another Week at the Office -- 4 Discussion and Implications -- 4.1 Human Factors and Threat Modeling.
4.2 STRIDE-HF as a User-Orientated Threat Modeling Approach -- 4.3 Future Work -- 5 Concluding Remarks -- References -- Smart Technologies and Internet of Things Designed for Aging in Place -- 1 Introduction -- 2 Aging in Place with IoT and Health-Related Smart Home Technologies -- 2.1 User Needs and Technology Requirements -- 2.2 IoT Standards: Technical Challenges -- 3 Models to Inform IoT and Smart Technology Adoption -- 3.1 Technology Acceptance Model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3.2 Human/Activity/Space/Technology Model (HAST) -- 4 Designing Smart Technology and IoT for Aging in Place -- 5 IoT, Privacy and Security, Acceptance and Adoption -- 5.1 Technology Acceptance Interviews -- 5.2 Privacy by Design, Usable Security for Home Healthcare Systems -- 6 Conclusion -- References -- Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration -- 1 Introduction -- 2 Background and Related Work -- 3 IPA Task -- 3.1 IPA Functions Analysis in Vehicles -- 3.2 Personal Information of the IPAs -- 4 Method -- 4.1 WoZ-Prototype IPA -- 4.2 Participants and the Experiment Environment -- 4.3 Scenario -- 4.4 Participants and the Experiment Environment -- 5 Evaluation -- 5.1 Vehicle Contextual Function -- 5.2 Voice Interaction -- 5.3 Verbal Privacy -- 5.4 Carpooling -- 5.5 Car-Sharing -- 6 Discussion and Future Research -- References -- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces -- 1 Introduction -- 2 Data Requester Specification -- 3 Shareability Theory Extension -- 4 Policy Review Matrix -- 5 Summary -- References -- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk -- 1 Introduction -- 2 Background -- 3 Method.
3.1 Participants -- 3.2 Dataset -- 3.3 Procedure -- 4 Results -- 4.1 Relationship of Scores to Tool Outputs -- 4.2 Color Use -- 4.3 Number Scheme -- 4.4 Visual Chart -- 5 Analysis -- 6 Conclusions and Future Work -- References -- Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior -- 1 Introduction -- 2 Background -- 2.1 Individual Differences in Cyber-Security -- 2.2 Measurement Techniques and Data Resolution -- 3 Method -- 3.1 Participants -- 3.2 Study Design, Materials and Procedure -- 4 Results -- 4.1 SeBIS Device Securement -- 4.2 SeBIS Proactive Awareness -- 4.3 SeBIS Updating -- 4.4 SeBIS Password Generation -- 5 Discussion -- 6 Limitations -- 7 Conclusions and Future Directions -- References -- Privacy Design Strategies and the GDPR: A Systematic Literature Review -- 1 Introduction -- 2 Methodology -- 2.1 Planning -- 2.2 Execution -- 3 Results Analysis -- 4 Discussion -- 5 Conclusions and Future Work -- References -- User Behavior Analysis in Cybersecurity -- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure -- 1 Introduction -- 2 Background -- 2.1 Adolescent Online Safety and Risks -- 2.2 Parental Mediation Influence on Adolescent Online Risk Exposure -- 3 A Family Systems Approach -- 4 Methods -- 4.1 Diary Study Overview -- 4.2 Diary Study Measures -- 4.3 Data Analysis Approach -- 4.4 Participant Recruitment -- 5 Results -- 5.1 Descriptive Statistics -- 5.2 Exposure to Explicit Content -- 5.3 Risk Exposure to Sexual Solicitations -- 5.4 Exposure to Online Harassment -- 6 Discussion -- 6.1 Parent vs. Teen Perceptions of Mediation and Risk Exposure -- 6.2 Risk Exposure Affects Parental Mediation -- 6.3 'Just-in-Time' Parenting.
6.4 Limitations and Future Research.
Record Nr. UNISA-996464383803316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
HCI for cybersecurity, privacy and trust : third International Conference, HCI-CPT 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021, proceedings / / Abbas Moallem, editor
HCI for cybersecurity, privacy and trust : third International Conference, HCI-CPT 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021, proceedings / / Abbas Moallem, editor
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (500 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-030-77392-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- HCI International 2021 Thematic Areas and Affiliated Conferences -- Contents -- Usable Security -- Authentication Management of Home IoT Devices -- 1 Introduction -- 2 Background -- 2.1 Security and Privacy Issues in Home IoT Devices -- 2.2 Usability of Home IoT Security -- 2.3 Authentication Challenges in Multi-user Smart Home Devices -- 3 Study -- 3.1 Survey Structure -- 3.2 Participants -- 4 Results -- 4.1 Security and Data Privacy Concern -- 4.2 Password Management of Home IoT Devices -- 4.3 Features for Home IoT Password Management -- 5 Discussion -- 5.1 Design Guidelines for an IoT Password Management Tool -- 5.2 Limitations and Future Work -- 6 Conclusion -- References -- Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal? -- 1 Introduction -- 2 Emics-Etics Framework for Usable Security: A Culture-Centric Framework to Address Usability Problems with Security Tools -- 3 When Security Emics Meets Etics: Culture-Specific Security Challenges -- 3.1 Software Piracy -- 3.2 Password Sharing -- 3.3 Mobile Phone Sharing -- 4 Discussion -- 4.1 Sharing as Cultural Norm and Necessity -- 4.2 Sharing in Business Strategy -- 4.3 Sharing in Technology Tools -- 5 Conclusion -- References -- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks -- 1 Introduction -- 1.1 Past Research -- 1.2 Present Research -- 1.3 Hypotheses -- 2 Development Process -- 3 Study Method -- 3.1 Participants -- 3.2 Procedure -- 4 Results and Implications -- 5 Conclusions and Future Research -- References -- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review -- 1 Introduction -- 1.1 Pervasiveness -- 1.2 Lingering Questions -- 1.3 Answering Questions with User Testing -- 2 Methods -- 3 Results -- 3.1 Included Studies -- 3.2 Study Participants -- 3.3 Study Methods.
3.4 Study Findings -- 3.5 Study Limitations -- 3.6 Study Quality -- 4 Conclusion -- References -- Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes -- 1 Introduction -- 2 User Study -- 2.1 Research Questions -- 2.2 Study Instruments -- 2.3 Sampling and Procedure -- 3 Analysis of Results -- 3.1 Differences in Time to the Solve Image-Recognition HIP Challenge Between Holistic and Analytic Users -- 3.2 Differences in Time to Visually Explore the Image During Solving the Image-Recognition HIP Challenge Between Holistic and Analytic Users -- 3.3 Differences in Eye Gaze Behavior During Solving the Image-Recognition HIP Challenge Between Holistic and Analytic Users -- 4 Main Findings -- 5 Conclusions and Future Work -- References -- Risk Assessment of ``Ostrich ZIP'' -- 1 Introduction -- 2 Organizing the Ostrich ZIP Discussion -- 2.1 Literature Review -- 2.2 Web Survey -- 2.3 Advantages of Ostrich ZIP -- 2.4 Disadvantages of Ostrich ZIP -- 2.5 The Ostrich ZIP Threats -- 2.6 Background of Ostrich ZIP Usage -- 2.7 Alternative Methods for Ostrich ZIP -- 3 Survey on the Current Status of the Ostrich ZIP -- 3.1 Specification -- 3.2 Encrypted ZIP Support in Typical Environments -- 3.3 Automatic Ostrich ZIP -- 4 Model of Information Leakage Events in File Sharing During E-Mail Sending and Receiving -- 4.1 Events Related to Information Leakage via E-Mail -- 4.2 Situation of E-Mail Use and Incidents of Information Leakage -- 4.3 Event Model and Simplified Probability of Leakage Occurrence for Each Leakage Case -- 5 Leakage Risk Assessment Using Event Models -- 6 Discussion -- 6.1 Information Leakage Risk and Usability -- 6.2 Discontinuation of the Use of TPE and the Effect of AES Support in Various Environments -- 6.3 Control of Information.
6.4 Reasons for Adopting Ostrich ZIP and Current Status -- 6.5 Overseas Trends -- 7 Conclusion -- References -- Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users -- 1 Introduction -- 2 Literature Review -- 2.1 Research on Identity Recognition Based on Network User Behavior -- 2.2 Classifiers Used in Existing Research -- 3 Methodology -- 3.1 Research on Hierarchical Behavior Characteristics of Network Users -- 3.2 Characteristics Fusion and Identity Recognition Methods -- 4 Experimental Analysis and Results -- 4.1 Experimental Analysis -- 4.2 Results -- 5 Limitations and Future Work -- 6 Conclusions -- References -- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services -- 1 Introduction -- 2 Emerging Transaction Authorization Methods -- 3 Threats to Transaction Authorization -- 4 Risk Analysis -- 5 Countermeasures -- 6 Conclusions -- References -- Security and Privacy by Design -- Beyond Murphy's Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience -- 1 Introduction -- 1.1 Case Study -- 2 Recognised HF Approaches -- 2.1 HF Adoption of Formal Cyber-Security Methods -- 2.2 HF Practitioner Experience -- 2.3 Culture -- 2.4 Safety Assurance Applied to Security -- 3 Methods -- 4 Discussion -- 4.1 Iterative Model Development and Validation -- 4.2 Integrating Cyber and HF Approaches -- 4.3 Qualitative and Quantitative Methods -- 5 Conclusion -- References -- A Human Factor Approach to Threat Modeling -- 1 Introduction -- 2 Background and Related Work -- 2.1 Human Factors -- 2.2 Human Factors and Cybersecurity -- 2.3 Threat Modeling -- 3 STRIDE-HF -- 3.1 Implementing STRIDE-HF into an Interactive Experience: Another Week at the Office -- 4 Discussion and Implications -- 4.1 Human Factors and Threat Modeling.
4.2 STRIDE-HF as a User-Orientated Threat Modeling Approach -- 4.3 Future Work -- 5 Concluding Remarks -- References -- Smart Technologies and Internet of Things Designed for Aging in Place -- 1 Introduction -- 2 Aging in Place with IoT and Health-Related Smart Home Technologies -- 2.1 User Needs and Technology Requirements -- 2.2 IoT Standards: Technical Challenges -- 3 Models to Inform IoT and Smart Technology Adoption -- 3.1 Technology Acceptance Model (TAM) and Unified Theory of Acceptance and Use of Technology (UTAUT) -- 3.2 Human/Activity/Space/Technology Model (HAST) -- 4 Designing Smart Technology and IoT for Aging in Place -- 5 IoT, Privacy and Security, Acceptance and Adoption -- 5.1 Technology Acceptance Interviews -- 5.2 Privacy by Design, Usable Security for Home Healthcare Systems -- 6 Conclusion -- References -- Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration -- 1 Introduction -- 2 Background and Related Work -- 3 IPA Task -- 3.1 IPA Functions Analysis in Vehicles -- 3.2 Personal Information of the IPAs -- 4 Method -- 4.1 WoZ-Prototype IPA -- 4.2 Participants and the Experiment Environment -- 4.3 Scenario -- 4.4 Participants and the Experiment Environment -- 5 Evaluation -- 5.1 Vehicle Contextual Function -- 5.2 Voice Interaction -- 5.3 Verbal Privacy -- 5.4 Carpooling -- 5.5 Car-Sharing -- 6 Discussion and Future Research -- References -- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces -- 1 Introduction -- 2 Data Requester Specification -- 3 Shareability Theory Extension -- 4 Policy Review Matrix -- 5 Summary -- References -- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk -- 1 Introduction -- 2 Background -- 3 Method.
3.1 Participants -- 3.2 Dataset -- 3.3 Procedure -- 4 Results -- 4.1 Relationship of Scores to Tool Outputs -- 4.2 Color Use -- 4.3 Number Scheme -- 4.4 Visual Chart -- 5 Analysis -- 6 Conclusions and Future Work -- References -- Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior -- 1 Introduction -- 2 Background -- 2.1 Individual Differences in Cyber-Security -- 2.2 Measurement Techniques and Data Resolution -- 3 Method -- 3.1 Participants -- 3.2 Study Design, Materials and Procedure -- 4 Results -- 4.1 SeBIS Device Securement -- 4.2 SeBIS Proactive Awareness -- 4.3 SeBIS Updating -- 4.4 SeBIS Password Generation -- 5 Discussion -- 6 Limitations -- 7 Conclusions and Future Directions -- References -- Privacy Design Strategies and the GDPR: A Systematic Literature Review -- 1 Introduction -- 2 Methodology -- 2.1 Planning -- 2.2 Execution -- 3 Results Analysis -- 4 Discussion -- 5 Conclusions and Future Work -- References -- User Behavior Analysis in Cybersecurity -- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure -- 1 Introduction -- 2 Background -- 2.1 Adolescent Online Safety and Risks -- 2.2 Parental Mediation Influence on Adolescent Online Risk Exposure -- 3 A Family Systems Approach -- 4 Methods -- 4.1 Diary Study Overview -- 4.2 Diary Study Measures -- 4.3 Data Analysis Approach -- 4.4 Participant Recruitment -- 5 Results -- 5.1 Descriptive Statistics -- 5.2 Exposure to Explicit Content -- 5.3 Risk Exposure to Sexual Solicitations -- 5.4 Exposure to Online Harassment -- 6 Discussion -- 6.1 Parent vs. Teen Perceptions of Mediation and Risk Exposure -- 6.2 Risk Exposure Affects Parental Mediation -- 6.3 'Just-in-Time' Parenting.
6.4 Limitations and Future Research.
Record Nr. UNINA-9910488690603321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HCI for Cybersecurity, Privacy and Trust [[electronic resource] ] : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings / / edited by Abbas Moallem
HCI for Cybersecurity, Privacy and Trust [[electronic resource] ] : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings / / edited by Abbas Moallem
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XX, 684 p. 193 illus., 113 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico User interfaces (Computer systems)
Computer networks - Security measures
Computer security
Data encryption (Computer science)
Computer communication systems
Coding theory
Information theory
User Interfaces and Human Computer Interaction
Mobile and Network Security
Systems and Data Security
Cryptology
Computer Communication Networks
Coding and Information Theory
ISBN 3-030-50309-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Human Factors in Cybersecurity -- Privacy and Trust -- Usable Security Approaches.
Record Nr. UNISA-996418309703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings / / edited by Abbas Moallem
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings / / edited by Abbas Moallem
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XX, 684 p. 193 illus., 113 illus. in color.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico User interfaces (Computer systems)
Computer networks - Security measures
Computer security
Data encryption (Computer science)
Computer networks
Coding theory
Information theory
User Interfaces and Human Computer Interaction
Mobile and Network Security
Systems and Data Security
Cryptology
Computer Communication Networks
Coding and Information Theory
ISBN 3-030-50309-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Human Factors in Cybersecurity -- Privacy and Trust -- Usable Security Approaches.
Record Nr. UNINA-9910413443603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
HCI for Cybersecurity, Privacy and Trust [[electronic resource] ] : First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / / edited by Abbas Moallem
HCI for Cybersecurity, Privacy and Trust [[electronic resource] ] : First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / / edited by Abbas Moallem
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIX, 484 p. 292 illus., 131 illus. in color.)
Disciplina 004.019
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico User interfaces (Computer systems)
Computer security
Data encryption (Computer science)
Application software
Computers
User Interfaces and Human Computer Interaction
Systems and Data Security
Security Services
Cryptology
Information Systems Applications (incl. Internet)
Computing Milieux
ISBN 3-030-22351-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- Privacy Preserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions.
Record Nr. UNISA-996466359303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
HCI for Cybersecurity, Privacy and Trust : First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / / edited by Abbas Moallem
HCI for Cybersecurity, Privacy and Trust : First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings / / edited by Abbas Moallem
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIX, 484 p. 292 illus., 131 illus. in color.)
Disciplina 004.019
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico User interfaces (Computer systems)
Computer security
Data encryption (Computer science)
Application software
Computers
User Interfaces and Human Computer Interaction
Systems and Data Security
Security Services
Cryptology
Information Systems Applications (incl. Internet)
Computing Milieux
ISBN 3-030-22351-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- Privacy Preserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions.
Record Nr. UNINA-9910349312803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui