|
Novel Authentication Systems |
|
|
|
Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal Security |
|
|
3 | (10) |
|
|
|
|
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems |
|
|
13 | (10) |
|
|
|
|
Investigating an Intrusion Prevention System for Brain-Computer Interfaces |
|
|
23 | (6) |
|
|
|
|
Inconspicuous Personal Computer Protection with Touch-Mouse |
|
|
29 | (10) |
|
|
|
|
|
|
|
|
39 | (10) |
|
|
|
Recognition of Human Identity by Detection of User Activity |
|
|
49 | (10) |
|
|
|
|
Learning a Policy for Gesture-Based Active Multi-touch Authentication |
|
|
59 | (12) |
|
|
|
|
|
Human Factors in Security |
|
|
|
Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA Mechanisms |
|
|
71 | (9) |
|
|
|
|
|
|
Relationships between Password Choices, Perceptions of Risk and Security Expertise |
|
|
80 | (10) |
|
|
|
|
|
Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust |
|
|
90 | (10) |
|
|
|
|
A Comparison of American and German Folk Models of Home Computer Security |
|
|
100 | (10) |
|
|
|
|
|
Health Is Silver, Beauty Is Golden?: How the Usage Context Influences the Acceptance of an Invasive Technology |
|
|
110 | (9) |
|
|
|
A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk---The Case of Japanese Internet Users--- |
|
|
119 | (8) |
|
|
Personality's Influence on Facebook's Privacy Settings: A Case of College Students in Taiwan |
|
|
127 | (8) |
|
|
|
An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social Networks |
|
|
135 | (10) |
|
|
|
A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation Awareness |
|
|
145 | (10) |
|
|
|
Click Me If You Can!: When Do Users Follow a Call to Action in an Online Message? |
|
|
155 | (12) |
|
|
|
|
Increasing Trust Perceptions in the Internet of Things |
|
|
167 | (9) |
|
|
|
Perception of Risky Security Behaviour by Users: Survey of Current Approaches |
|
|
176 | (10) |
|
|
|
|
Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps |
|
|
186 | (11) |
|
|
|
Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats |
|
|
197 | (12) |
|
|
Security and Privacy Policies |
|
|
|
Strategic Stakeholder Interaction Analysis of Cloud-Based Mobile Applications Use of Privacy-Sensitive End Users |
|
|
209 | (8) |
|
|
|
|
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers |
|
|
217 | (9) |
|
|
|
Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring |
|
|
226 | (10) |
|
|
A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy |
|
|
236 | (10) |
|
|
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent |
|
|
246 | (10) |
|
|
|
|
|
Modeling Security Policy and the Effect for End-Users |
|
|
256 | (10) |
|
|
|
Legal Protection for Personal Information Privacy |
|
|
266 | (10) |
|
|
"The Four Most-Used Passwords Are Love, Sex, Secret, and God": Password Security and Training in Different User Groups |
|
|
276 | (8) |
|
|
|
|
The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools |
|
|
284 | (13) |
|
|
User Centric Security and Privacy |
|
|
|
Addressing User Privacy and Experience in Distributed Long Lifetime Systems |
|
|
297 | (9) |
|
|
Secure and Energy-Efficient Life-Logging in Wireless Pervasive Environments |
|
|
306 | (10) |
|
|
|
|
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics |
|
|
316 | (10) |
|
|
|
|
|
On the Secure and Safe Data Synchronization |
|
|
326 | (6) |
|
|
|
The Practice of Global Internet Filtering |
|
|
332 | (6) |
|
|
A Privacy-Level Model of User-Centric Cyber-Physical Systems |
|
|
338 | (10) |
|
|
|
|
|
High-Level Design for a Secure Mobile Device Management System |
|
|
348 | (9) |
|
|
|
|
|
|
Factors Influencing Adoption of Encryption to Secure Data in the Cloud |
|
|
357 | (9) |
|
|
Cloudopsy: An Autopsy of Data Flows in the Cloud |
|
|
366 | (11) |
|
|
|
|
|
|
Author Index |
|
377 | |