Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings
De som köpt den här boken har ofta också köpt Think and Grow Rich av Napoleon Hill (häftad).
Köp båda 2 för 727 krUsable Security.- On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security.- A Network Telescope for Early Warning Intrusion Detection.- Visualization of System Log Files for Post-incident Analysis and Response.- An Assessment Framework for Usable-Security Based on Decision Science.- On Designing Usable Policy Languages for Declarative Trust Aggregation.- An Image-Based CAPTCHA Using Sophisticated Mental Rotation.- What Usable Security Really Means: Trusting and Engaging Users.- QR Code Security: A Survey of Attacks and Challenges for Usable Security.- Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India.- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security.- Authentication and Passwords Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.- A Cognitive-Behavioral Framework of User Password Management Lifecycle.- Do Graphical Authentication Systems Solve the Password Memorability Problem.- E-voting Authentication with QR-codes.- I Cant Type That! P@$$w0rd Entry on Mobile Devices.- Capturing Attention for Warnings about Insecure Password Fields Systematic Development of a Passive Security Intervention.- ACCESS: Describing and Contrasting Authentication Mechanisms.- Character Strings, Memory and Passwords: What a Recall Study Can Tell Us.- Security Policy and Awareness.- From Regulations to Practice: Achieving Information Security Compliance in Healthcare.- Rethinking the Smart Card Technology.- Compositional Security Modelling: Structure, Economics, and Behaviour.- End User Development and Information Security Culture.- DSAPE Dynamic Security Awareness Program Evaluation.- A Critical Reflection on the Threat from Human Insiders Its Nature, Industry Perceptions, and Detection Approaches.- Changing Faces: Identifying Complex Behavioural Profiles.- Human Behaviour in Cybersecurity.- A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.- Socio-technical Security Analysis of Wireless Hotspots.- A Conceptual Framework to Study Socio-Technical Security.- An Evaluation of Behavioural Profiling on Mobile Devices.- Nudging for Quantitative Access Control Systems.- Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.- The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role of Security Culture.- Privacy Issues.- User Acceptance of Privacy-ABCs: An Exploratory Study.- My Life Doesnt Have to Be an Open Book: A Model to Help Designers to Enhance Privacy Controls on Social Network Sites.- Paper Audit Trails and Voters Privacy Concerns.- Mental Models for Usable Privacy: A Position Paper.- Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users.- Privacy Protection Based Privacy ConflictDetection and Solution in Online Social Networks.