default search action
19th HCI 2017: Vancouver, BC, Canada
- Theo Tryfonas:
Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science 10292, Springer 2017, ISBN 978-3-319-58459-1
Human Factors in Security
- Pam Briggs, Debora Jeske, Lynne M. Coventry:
The Design of Messages to Improve Cybersecurity Incident Reporting. 3-13 - Scott Cadzow:
Overcoming Fear of the Threat Model. 14-24 - Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. 25-44 - Titiana Ertiö, Pekka Räsänen:
Mobile Online Proficiency and Mobile Internet Use - Findings from Finland. 45-56 - Lucas Ferreira, Junia Anacleto:
Usability in Solutions of Secure Email - A Tools Review. 57-73 - Denis Feth, Andreas Maier, Svenja Polst:
A User-Centered Model for Usable Security and Privacy. 74-89 - Thomas Given-Wilson, Axel Legay, Sean Sedwards:
Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults. 90-109 - Hsiao-Ying Huang, Masooda N. Bashir:
Android App Permission and Users' Adoption: A Case Study of Mental Health Application. 110-122 - Norbert Nthala, Ivan Flechais:
"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions. 123-142 - Lynsay A. Shepherd, Jacqueline Archibald, Robert Ian Ferguson:
Assessing the Impact of Affective Feedback on End-User Security Awareness. 143-159 - Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs. 160-173 - Panagiotis Zagouras, Christos Kalloniatis, Stefanos Gritzalis:
Managing User Experience: Usability and Security in a New Era of Software Supremacy. 174-188
Usable Authentication
- Nouf Aljaffan, Haiyue Yuan, Shujun Li:
PSV (Password Security Visualizer): From Password Checking to User Education. 191-211 - Frans F. Blauw:
Dear Password, I Know You Too Well - A Congenial Call for Ubiquitous Authentication. 212-225 - Oliver Buckley, Duncan Hodges, Melissa Hadgkiss, Sarah Morris:
Keystroke Inference Using Smartphone Kinematics. 226-238 - Quan Wang, Lelai Deng, Hao Cheng, Hualei Fan, Xiaoping Du, Qinghong Yang:
Live Gaze-Based Authentication and Gaming System. 239-250 - Haiyue Yuan, Shujun Li, Patrice Rusconi, Nouf Aljaffan:
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. 251-264 - Verena Zimmermann, Nina Gerber:
"If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies. 265-283
Security in Organizations and Infrastructures
- Noura Al Moubayed, David Wall, A. Stephen McGough:
Identifying Changes in the Cybersecurity Threat Landscape Using the LDA-Web Topic Modelling Data Search Engine. 287-295 - Jaco du Toit, Ian Ellefsen:
Secure Peripherals in a Converged Mobile Environment. 296-308 - Tesleem Fagade, Theodoros Spyridopoulos, Nabeel Albishry, Theodore Tryfonas:
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis. 309-321 - Seokjun Hong, Youngsun Kim, Gerard Jounghyun Kim:
Developing Usable Interface for Internet of Things (IoT) Security Analysis Software. 322-328 - Manabu Ishihara, Taiki Kanayama:
Visualization Technologies of Information Security Support System Using Haptic Devices. 329-338 - Florian Kammüller:
Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems. 339-352 - Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi:
Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders. 353-365 - Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. 366-383 - Hao Wang, Nathan Lau, Ryan M. Gerdes:
Application of Work Domain Analysis for Cybersecurity. 384-395 - Jodie Ward, Huseyin Dogan, Edward Apeh, Alexios Mylonas, Vasilios Katos:
Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme. 396-413 - Shao-Fang Wen, Stewart Kowalski:
A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities. 414-431 - Jeong-Han Yun, Seungoh Choi, Woonyon Kim, Hwasun Kang, Sung-Woo Kim:
Usable Security Management for Network Access Rules of Critical Infrastructure. 432-447
Cyber Security Policies
- Ahto Buldas, Märt Saarepera:
Are the Current System Engineering Practices Sufficient to Meet Cyber Crime? 451-463 - Lizzie Coles-Kemp, René Rydhof Hansen:
Walking the Line: The Everyday Security Ties that Bind. 464-480 - Joanne Hinds, Adam N. Joinson:
Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI. 481-493 - Duncan Hodges, Oliver Buckley:
Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals. 494-506 - Jason Perno, Christian W. Probst:
Behavioural Profiling in Cyber-Social Systems. 507-517 - Huw Read, Iain Sutherland, Konstantinos Xynos, Tom Drange, Ernst Sundt:
The Impact of Changing Technology on International Cybersecurity Curricula. 518-528 - David S. Wall:
Towards a Conceptualisation of Cloud (Cyber) Crime. 529-538 - Steve Warren, Gavin Oxburgh, Pam Briggs, David Wall:
How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? 539-556 - Laurin B. Weissinger:
Modelling Trust and Trust-Building Among IT-Security Professionals - How Do Practitioners Find Out Whom to Work With? 557-566 - Franziska Zimmer, Kaja J. Fietkiewicz, Wolfgang G. Stock:
Law Infringements in Social Live Streaming Services. 567-585
HCI and Privacy Issues
- Kallia Anastasopoulou, Spyros Kokolakis, Panagiotis Andriotis:
Privacy Decision-Making in the Digital Era: A Game Theoretic Review. 589-603 - Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, Gianluca Stringhini:
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model. 604-622 - Beatriz Brito do Rêgo, Ingrid Teixeira Monteiro, Andréia Libório Sampaio:
Communicability Evaluation of Privacy Settings on Facebook for Android. 623-639 - Nina Gerber, Paul Gerber, Maria Hernando:
Sharing the 'Real Me' - How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook. 640-655 - Marco Ghiglieri, Melanie Volkamer, Karen Renaud:
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. 656-674 - Oksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer:
Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information. 675-690 - Christopher Lentzsch, Kai-Uwe Loser, Martin Degeling, Alexander Nolte:
Integrating a Practice Perspective to Privacy by Design. 691-702 - Hui Li, Wenling Liu, Bin Wang, Wen Zhang:
Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in Android. 703-721 - Danilo M. Nogueira, Cristiano Maciel, José Viterbo, Daniel Vecchiato:
A Privacy-Driven Data Management Model for Smart Personal Assistants. 722-738 - Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage, Jill Slay:
Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy. 739-752
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.