


default search action
19th HCI 2017: Vancouver, BC, Canada
- Theo Tryfonas:

Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Lecture Notes in Computer Science 10292, Springer 2017, ISBN 978-3-319-58459-1
Human Factors in Security
- Pam Briggs

, Debora Jeske, Lynne M. Coventry
:
The Design of Messages to Improve Cybersecurity Incident Reporting. 3-13 - Scott Cadzow:

Overcoming Fear of the Threat Model. 14-24 - Steve Dodier-Lazaro, Ingolf Becker, Jens Krinke, M. Angela Sasse

:
"No Good Reason to Remove Features" - Expert Users Value Useful Apps over Secure Ones. 25-44 - Titiana Ertiö, Pekka Räsänen

:
Mobile Online Proficiency and Mobile Internet Use - Findings from Finland. 45-56 - Lucas Ferreira, Junia Anacleto:

Usability in Solutions of Secure Email - A Tools Review. 57-73 - Denis Feth, Andreas Maier, Svenja Polst:

A User-Centered Model for Usable Security and Privacy. 74-89 - Thomas Given-Wilson

, Axel Legay, Sean Sedwards:
Information Security, Privacy, and Trust in Social Robotic Assistants for Older Adults. 90-109 - Hsiao-Ying Huang, Masooda N. Bashir

:
Android App Permission and Users' Adoption: A Case Study of Mental Health Application. 110-122 - Norbert Nthala, Ivan Flechais:

"If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions. 123-142 - Lynsay A. Shepherd

, Jacqueline Archibald, Robert Ian Ferguson:
Assessing the Impact of Affective Feedback on End-User Security Awareness. 143-159 - Chamila Wijayarathna

, Nalin Asanka Gamagedara Arachchilage
, Jill Slay
:
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs. 160-173 - Panagiotis Zagouras, Christos Kalloniatis, Stefanos Gritzalis

:
Managing User Experience: Usability and Security in a New Era of Software Supremacy. 174-188
Usable Authentication
- Nouf Aljaffan, Haiyue Yuan

, Shujun Li
:
PSV (Password Security Visualizer): From Password Checking to User Education. 191-211 - Frans F. Blauw

:
Dear Password, I Know You Too Well - A Congenial Call for Ubiquitous Authentication. 212-225 - Oliver Buckley

, Duncan Hodges
, Melissa Hadgkiss, Sarah Morris
:
Keystroke Inference Using Smartphone Kinematics. 226-238 - Quan Wang

, Lelai Deng, Hao Cheng, Hualei Fan, Xiaoping Du, Qinghong Yang:
Live Gaze-Based Authentication and Gaming System. 239-250 - Haiyue Yuan

, Shujun Li
, Patrice Rusconi
, Nouf Aljaffan:
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems. 251-264 - Verena Zimmermann, Nina Gerber

:
"If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies. 265-283
Security in Organizations and Infrastructures
- Noura Al Moubayed

, David Wall
, A. Stephen McGough
:
Identifying Changes in the Cybersecurity Threat Landscape Using the LDA-Web Topic Modelling Data Search Engine. 287-295 - Jaco du Toit

, Ian Ellefsen:
Secure Peripherals in a Converged Mobile Environment. 296-308 - Tesleem Fagade, Theodoros Spyridopoulos

, Nabeel Albishry
, Theodore Tryfonas
:
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis. 309-321 - Seokjun Hong, Youngsun Kim, Gerard Jounghyun Kim:

Developing Usable Interface for Internet of Things (IoT) Security Analysis Software. 322-328 - Manabu Ishihara, Taiki Kanayama:

Visualization Technologies of Information Security Support System Using Haptic Devices. 329-338 - Florian Kammüller:

Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems. 339-352 - Koichi Niihara, Michihiro Yamada, Hiroaki Kikuchi:

Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious Insiders. 353-365 - Jason R. C. Nurse, Ioannis Agrafiotis, Arnau Erola, Maria Bada, Taylor Roberts, Meredydd Williams, Michael Goldsmith, Sadie Creese:

An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System. 366-383 - Hao Wang, Nathan Lau

, Ryan M. Gerdes:
Application of Work Domain Analysis for Cybersecurity. 384-395 - Jodie Ward, Huseyin Dogan

, Edward Apeh
, Alexios Mylonas
, Vasilios Katos:
Using Human Factor Approaches to an Organisation's Bring Your Own Device Scheme. 396-413 - Shao-Fang Wen, Stewart Kowalski:

A Case Study: Heartbleed Vulnerability Management and Swedish Municipalities. 414-431 - Jeong-Han Yun, Seungoh Choi, Woonyon Kim, Hwasun Kang, Sung-Woo Kim:

Usable Security Management for Network Access Rules of Critical Infrastructure. 432-447
Cyber Security Policies
- Ahto Buldas

, Märt Saarepera:
Are the Current System Engineering Practices Sufficient to Meet Cyber Crime? 451-463 - Lizzie Coles-Kemp, René Rydhof Hansen

:
Walking the Line: The Everyday Security Ties that Bind. 464-480 - Joanne Hinds

, Adam N. Joinson
:
Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI. 481-493 - Duncan Hodges

, Oliver Buckley
:
Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security Professionals. 494-506 - Jason Perno, Christian W. Probst

:
Behavioural Profiling in Cyber-Social Systems. 507-517 - Huw Read

, Iain Sutherland
, Konstantinos Xynos
, Tom Drange, Ernst Sundt:
The Impact of Changing Technology on International Cybersecurity Curricula. 518-528 - David S. Wall

:
Towards a Conceptualisation of Cloud (Cyber) Crime. 529-538 - Steve Warren, Gavin Oxburgh

, Pam Briggs
, David Wall
:
How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? 539-556 - Laurin B. Weissinger:

Modelling Trust and Trust-Building Among IT-Security Professionals - How Do Practitioners Find Out Whom to Work With? 557-566 - Franziska Zimmer, Kaja J. Fietkiewicz

, Wolfgang G. Stock:
Law Infringements in Social Live Streaming Services. 567-585
HCI and Privacy Issues
- Kallia Anastasopoulou, Spyros Kokolakis, Panagiotis Andriotis

:
Privacy Decision-Making in the Digital Era: A Game Theoretic Review. 589-603 - Panagiotis Andriotis

, Shancang Li, Theodoros Spyridopoulos
, Gianluca Stringhini:
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model. 604-622 - Beatriz Brito do Rêgo, Ingrid Teixeira Monteiro, Andréia Libório Sampaio:

Communicability Evaluation of Privacy Settings on Facebook for Android. 623-639 - Nina Gerber

, Paul Gerber, Maria Hernando:
Sharing the 'Real Me' - How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook. 640-655 - Marco Ghiglieri, Melanie Volkamer, Karen Renaud:

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks. 656-674 - Oksana Kulyk, Benjamin Maximilian Reinheimer, Melanie Volkamer:

Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information. 675-690 - Christopher Lentzsch

, Kai-Uwe Loser, Martin Degeling
, Alexander Nolte
:
Integrating a Practice Perspective to Privacy by Design. 691-702 - Hui Li, Wenling Liu, Bin Wang, Wen Zhang:

Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in Android. 703-721 - Danilo M. Nogueira, Cristiano Maciel

, José Viterbo
, Daniel Vecchiato:
A Privacy-Driven Data Management Model for Smart Personal Assistants. 722-738 - Awanthika Senarath

, Nalin Asanka Gamagedara Arachchilage
, Jill Slay
:
Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy. 739-752

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














