


default search action
15th HCI 2013: Las Vegas, Nevada, USA
- Louis Marinos, Ioannis G. Askoxylakis:

Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings. Lecture Notes in Computer Science 8030, Springer 2013, ISBN 978-3-642-39344-0
Novel Authentication Systems
- Sourav Bhuyan, Joel S. Greenstein, Kevin A. Juang:

Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal Security. 3-12 - Soumyadeb Chowdhury

, Ron Poet, Lewis Mackenzie:
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems. 13-22 - Saul D. Costa, Dale R. Stevens, Jeremy A. Hansen:

Investigating an Intrusion Prevention System for Brain-Computer Interfaces. 23-28 - Ming-Chun Huang, Wenyao Xu, Jason J. Liu, Yi Su, Lei He, Majid Sarrafzadeh:

Inconspicuous Personal Computer Protection with Touch-Mouse. 29-38 - Junya Kani, Masakatsu Nishigaki

:
Gamified CAPTCHA. 39-48 - Giuseppe Scardino, Ignazio Infantino, Filippo Vella

:
Recognition of Human Identity by Detection of User Activity. 49-58 - Raquel Torres Peralta

, Antons Rebguns, Ian R. Fasel, Kobus Barnard:
Learning a Policy for Gesture-Based Active Multi-touch Authentication. 59-68
Human Factors in Security
- Marios Belk, Panagiotis Germanakos, Christos Fidas

, George Spanoudis, George Samaras:
Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA Mechanisms. 71-79 - Sadie Creese, Duncan Hodges

, Sue Jamison-Powell, Monica T. Whitty
:
Relationships between Password Choices, Perceptions of Risk and Security Expertise. 80-89 - Martin Hesseler, Gerhard Hartmann, Stefan Karsch:

Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust. 90-99 - Michaela Kauer, Sebastian Günther

, Daniel Storck, Melanie Volkamer:
A Comparison of American and German Folk Models of Home Computer Security. 100-109 - Johanna Kluge, Martina Ziefle:

Health Is Silver, Beauty Is Golden? - How the Usage Context Influences the Acceptance of an Invasive Technology. 110-118 - Ayako Komatsu:

A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk - -The Case of Japanese Internet Users-. 119-126 - Tingya Kuo, Hung-Lian Tang:

Personality's Influence on Facebook's Privacy Settings: A Case of College Students in Taiwan. 127-134 - Ki Jung Lee, Il-Yeol Song:

An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social Networks. 135-144 - Celeste Lyn Paul, Kirsten Whitley:

A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation Awareness. 145-154 - Thomas Pfeiffer, Heike Theuerling, Michaela Kauer:

Click Me If You Can! - When Do Users Follow a Call to Action in an Online Message? 155-166 - Trenton Schulz, Ingvar Tjøstheim:

Increasing Trust Perceptions in the Internet of Things. 167-175 - Lynsay A. Shepherd

, Jacqueline Archibald, Robert Ian Ferguson
:
Perception of Risky Security Behaviour by Users: Survey of Current Approaches. 176-185 - Fuming Shih, Julia Boortz:

Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps. 186-196 - Martyn Styles:

Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats. 197-206
Security and Privacy Policies
- Kalliopi Anastasopoulou, Theo Tryfonas

, Spyros Kokolakis:
Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps. 209-216 - Steven Furnell, Nina Bär:

Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers. 217-225 - John D. Bustard:

Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring. 226-235 - Kathleen M. Hogan:

A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy. 236-245 - Michael Huth, Jim Huan-Pu Kuo, M. Angela Sasse, Iacovos Kirlappos:

Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent. 246-255 - Kevin D. Jones, Kizito Salako:

Modeling Security Policy and the Effect for End-Users. 256-265 - Yinan Liu:

Legal Protection for Personal Information Privacy. 266-275 - Birgy Lorenz

, Kaido Kikkas, Aare Klooster:
"The Four Most-Used Passwords Are Love, Sex, Secret, and God": Password Security and Training in Different User Groups. 276-283 - Shara Monteleone:

The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools. 284-294
User Centric Security and Privacy
- Scott W. Cadzow:

Addressing User Privacy and Experience in Distributed Long Lifetime Systems. 297-305 - Alexandros G. Fragkiadakis, Ioannis G. Askoxylakis, Elias Z. Tragos:

Secure and Energy-Efficient Life-Logging in Wireless Pervasive Environments. 306-315 - Jason R. C. Nurse, Sadie Creese, Michael Goldsmith, Syed Sadiqur Rahman:

Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics. 316-325 - Pavel Ocenasek, Jaromir Karmazin:

On the Secure and Safe Data Synchronization. 326-331 - Pavel Ocenasek:

The Practice of Global Internet Filtering. 332-337 - Nikolaos E. Petroulakis, Ioannis G. Askoxylakis, Apostolos Traganitis, George Spanoudakis:

A Privacy-Level Model of User-Centric Cyber-Physical Systems. 338-347 - Keunwoo Rhee, Sun-Ki Eun, Mi-Ri Joo, Jihoon Jeong, Dongho Won:

High-Level Design for a Secure Mobile Device Management System. 348-356 - Kenneth E. Stavinoha:

Factors Influencing Adoption of Encryption to Secure Data in the Cloud. 357-365 - Angeliki Zavou, Vasilis Pappas, Vasileios P. Kemerlis

, Michalis Polychronakis, Georgios Portokalidis
, Angelos D. Keromytis:
Cloudopsy: An Autopsy of Data Flows in the Cloud. 366-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














