default search action
16th HCI 2014: Heraklion, Crete, Greece
- Theo Tryfonas, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Lecture Notes in Computer Science 8533, Springer 2014, ISBN 978-3-319-07619-5
Usable Security
- Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras:
On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security. 3-10 - Panos Chatziadam, Ioannis G. Askoxylakis, Alexandros G. Fragkiadakis:
A Network Telescope for Early Warning Intrusion Detection. 11-22 - John Haggerty, Thomas Hughes-Roberts:
Visualization of System Log Files for Post-incident Analysis and Response. 23-32 - Yasser M. Hausawi, William H. Allen:
An Assessment Framework for Usable-Security Based on Decision Science. 33-44 - Michael Huth, Jim Huan-Pu Kuo:
On Designing Usable Policy Languages for Declarative Trust Aggregation. 45-56 - Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki:
An Image-Based CAPTCHA Using Sophisticated Mental Rotation. 57-68 - Iacovos Kirlappos, Martina Angela Sasse:
What Usable Security Really Means: Trusting and Engaging Users. 69-78 - Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar R. Weippl:
QR Code Security: A Survey of Attacks and Challenges for Usable Security. 79-90 - Rutuja More, Abhishek Bora:
Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India. 91-101 - Paschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis:
Discrete Hardware Apparatus and Method for Mobile Application and Communication Security. 102-112
Authentication and Passwords
- Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou:
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. 115-126 - Yee-Yin Choong:
A Cognitive-Behavioral Framework of User Password Management Lifecycle. 127-137 - Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie:
Do Graphical Authentication Systems Solve the Password Memorability Problem? 138-148 - Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar R. Weippl:
E-voting Authentication with QR-codes. 149-159 - Kristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee:
I Can't Type That! P@$$w0rd Entry on Mobile Devices. 160-171 - Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt:
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention. 172-182 - Karen Renaud, Melanie Volkamer, Joseph Maguire:
ACCESS: Describing and Contrasting - Authentication Mechanisms. 183-194 - Brian C. Stanton, Kristen K. Greene:
Character Strings, Memory and Passwords: What a Recall Study Can Tell Us. 195-206
Security Policy and Awareness
- Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller:
From Regulations to Practice: Achieving Information Security Compliance in Healthcare. 209-220 - Raja Naeem Akram, Konstantinos Markantonakis:
Rethinking the Smart Card Technology. 221-232 - Tristan Caulfield, David J. Pym, Julian Williams:
Compositional Security Modelling - Structure, Economics, and Behaviour. 233-245 - Fredrik Karlsson, Karin Hedström:
End User Development and Information Security Culture. 246-257 - Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis:
DSAPE - Dynamic Security Awareness Program Evaluation. 258-269 - Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. 270-281 - Giles Oatley, Tom Crick:
Changing Faces: Identifying Complex Behavioural Profiles. 282-293
Human Behaviour in Cybersecurity
- Reza Alavi, Shareeful Islam, Haralambos Mouratidis:
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations. 297-305 - Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
Socio-technical Security Analysis of Wireless Hotspots. 306-317 - Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
A Conceptual Framework to Study Socio-Technical Security. 318-329 - Fudong Li, Ross Wheeler, Nathan L. Clarke:
An Evaluation of Behavioural Profiling on Mobile Devices. 330-339 - Charles Morisset, Thomas Groß, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. 340-351 - Mariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior. 352-360 - Karen Renaud, Wendy Goucher:
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture. 361-372
Privacy Issues
- Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou:
User Acceptance of Privacy-ABCs: An Exploratory Study. 375-386 - Francine Bülow Bergmann, Milene Selbach Silveira:
"My Life Doesn't Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites. 387-399 - Jurlind Budurushi, Simon Stockhardt, Marcel Woide, Melanie Volkamer:
Paper Audit Trails and Voters' Privacy Concerns. 400-409 - Kovila P. L. Coopamootoo, Thomas Groß:
Mental Models for Usable Privacy: A Position Paper. 410-421 - Anna L. Langhorne:
Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users? 422-432 - Arunee Ratikan, Mikifumi Shikida:
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks. 433-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.