Atjaunināt sīkdatņu piekrišanu

E-grāmata: Human Aspects of Information Security, Privacy and Trust: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings

Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.
Novel Authentication Systems
Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal Security
3(10)
Sourav Bhuyan
Joel S. Greenstein
Kevin A. Juang
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems
13(10)
Soumyadeb Chowdhury
Ron Poet
Lewis Mackenzie
Investigating an Intrusion Prevention System for Brain-Computer Interfaces
23(6)
Saul D. Costa
Dale R. Stevens
Jeremy A. Hansen
Inconspicuous Personal Computer Protection with Touch-Mouse
29(10)
Ming-Chun Huang
Wenyao Xu
Jason J. Liu
Yi Su
Lei He
Majid Sarrafzadeh
Gamified CAPTCHA
39(10)
Junya Kani
Masakatsu Nishigaki
Recognition of Human Identity by Detection of User Activity
49(10)
Giuseppe Scardino
Ignazio Infantino
Filippo Vella
Learning a Policy for Gesture-Based Active Multi-touch Authentication
59(12)
Raquel Torres Peralta
Anton Rebguns
Ian R. Fasel
Kobus Barnard
Human Factors in Security
Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA Mechanisms
71(9)
Marios Belk
Panagiotis Germanakos
Christos Fidas
George Spanoudis
George Samaras
Relationships between Password Choices, Perceptions of Risk and Security Expertise
80(10)
Sadie Creese
Duncan Hodges
Sue Jamison-Powell
Monica Whitty
Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust
90(10)
Martin Hesseler
Gerhard Hartmann
Stefan Karsch
A Comparison of American and German Folk Models of Home Computer Security
100(10)
Michaela Kauer
Sebastian Gunther
Daniel Storck
Melanie Volkamer
Health Is Silver, Beauty Is Golden?: How the Usage Context Influences the Acceptance of an Invasive Technology
110(9)
Johanna Kluge
Martina Ziefle
A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk---The Case of Japanese Internet Users---
119(8)
Ayako Komatsu
Personality's Influence on Facebook's Privacy Settings: A Case of College Students in Taiwan
127(8)
Tingya Kuo
Hung-Lian Tang
An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social Networks
135(10)
Kijung Lee
Il-Yeol Song
A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation Awareness
145(10)
Celeste Lyn Paul
Kirsten Whitley
Click Me If You Can!: When Do Users Follow a Call to Action in an Online Message?
155(12)
Thomas Pfeiffer
Heike Theuerling
Michaela Kauer
Increasing Trust Perceptions in the Internet of Things
167(9)
Trenton Schulz
Ingvar Tjøstheim
Perception of Risky Security Behaviour by Users: Survey of Current Approaches
176(10)
Lynsay A. Shepherd
Jacqueline Archibald
R. Ian Ferguson
Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps
186(11)
Fuming Shih
Julia Boortz
Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats
197(12)
Martyn Styles
Security and Privacy Policies
Strategic Stakeholder Interaction Analysis of Cloud-Based Mobile Applications Use of Privacy-Sensitive End Users
209(8)
Kalliopi Anastasopoulou
Theo Tryfonas
Spyros Kokolakis
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers
217(9)
Steven Furnell
Nina Bar
Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring
226(10)
John D. Bustard
A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy
236(10)
Kathleen M. Hogan
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent
246(10)
Michael Huth
Jim Huan-Pu Kuo
Angela Sasse
Iacovos Kirlappos
Modeling Security Policy and the Effect for End-Users
256(10)
Kevin D. Jones
Kizito Salako
Legal Protection for Personal Information Privacy
266(10)
Yinan Liu
"The Four Most-Used Passwords Are Love, Sex, Secret, and God": Password Security and Training in Different User Groups
276(8)
Birgy Lorenz
Kaido Kikkas
Aare Klooster
The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools
284(13)
Shara Monteleone
User Centric Security and Privacy
Addressing User Privacy and Experience in Distributed Long Lifetime Systems
297(9)
Scott W. Cadzow
Secure and Energy-Efficient Life-Logging in Wireless Pervasive Environments
306(10)
Alexandros Fragkiadakis
Ioannis Askoxylakis
Elias Tragos
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics
316(10)
Jason R.C. Nurse
Sadie Creese
Michael Goldsmith
Syed Sadiqur Rahman
On the Secure and Safe Data Synchronization
326(6)
Pavel Ocenasek
Jaromir Karmazin
The Practice of Global Internet Filtering
332(6)
Pavel Ocenasek
A Privacy-Level Model of User-Centric Cyber-Physical Systems
338(10)
Nikolaos E. Petroulakis
Ioannis G. Askoxylakis
Apostolos Traganitis
George Spanoudakis
High-Level Design for a Secure Mobile Device Management System
348(9)
Keunwoo Rhee
Sun-Ki Eun
Mi-Ri Joo
Jihoon Jeong
Dongho Won
Factors Influencing Adoption of Encryption to Secure Data in the Cloud
357(9)
Kenneth E. Stavinoha
Cloudopsy: An Autopsy of Data Flows in the Cloud
366(11)
Angeliki Zavou
Vasilis Pappas
Vasileios P. Kemerlis
Michalis Polychronakis
Georgios Portokalidis
Angelos D. Keromytis
Author Index 377