


default search action
HCI 2019: Orlando, FL, USA
- Abbas Moallem:

HCI for Cybersecurity, Privacy and Trust - First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings. Lecture Notes in Computer Science 11594, Springer 2019, ISBN 978-3-030-22350-2
Authentication
- Paul Biocco, Mohd Anwar:

Grid Authentication: A Memorability and User Sentiment Study. 3-18 - Nikola K. Blanchard

, Leila Gabasova, Ted Selker:
Consonant-Vowel-Consonants for Error-Free Code Entry. 19-37 - Tomoki Manabe, Hayato Yamana

:
Two-Factor Authentication Using Leap Motion and Numeric Keypad. 38-51 - Akitoshi Okumura, Shuji Komeiji, Motohiko Sakaguchi, Masahiro Tabuchi, Hiroaki Hattori:

Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction. 52-66 - Catlin Pidel, Stephan Neuhaus:

BREAKING: Password Entry Is Fine. 67-80 - Lauren N. Tiller, Catherine A. Angelini, Sarah C. Leibner, Jeremiah D. Still:

Explore-a-Nation: Combining Graphical and Alphanumeric Authentication. 81-95
Cybersecurity Awareness and Behavior
- Xavier J. A. Bellekens

, Gayan Jayasekara, Hanan Hindy
, Miroslav Bures, David Brosset, Christos Tachtatzis
, Robert C. Atkinson
:
From Cyber-Security Deception to Manipulation and Gratification Through Gamification. 99-114 - John Russell Cole, Toni B. Pence, Jeffrey Cummings, Elizabeth Baker:

Gamifying Security Awareness: A New Prototype. 115-133 - Giuseppe Desolda, Francesco Di Nocera

, Lauren S. Ferro
, Rosa Lanzilotti, Piero Maggi
, Andrea Marrella
:
Alerting Users About Phishing Attacks. 134-148 - Mazaher Kianpour

, Harald Øverby, Stewart James Kowalski, Christopher Frantz
:
Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties. 149-163 - Heather Molyneaux, Irina Kondratova, Elizabeth Stobert:

Understanding Perceptions: User Responses to Browser Warning Messages. 164-175 - Aarathi Prasad, Rubén Ruiz, Timothy Stablein:

Understanding Parents' Concerns with Smart Device Usage in the Home. 176-190 - Sam Scholefield, Lynsay A. Shepherd

:
Gamification Techniques for Raising Cyber Security Awareness. 191-203 - Mengyao Xu, Qian Yi, Shuping Yi, Shiquan Xiong:

An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain. 204-214
Security and Usability
- Ahmed I. Al-Darwish, Pilsung Choe

:
A Framework of Information Security Integrated with Human Factors. 217-229 - Alexander Berman, Celeste Lyn Paul:

Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets. 230-248 - Linda Briesemeister, Woodrow Gustafson, Grit Denker, April Martin, Karsten Martiny, Ron Moore, Dusko Pavlovic, Mark F. St. John:

Policy Creation for Enterprise-Level Data Sharing. 249-265 - João Rafael Gonçalves Evangelista

, Dacyr Dante de Oliveira Gatto
, Renato José Sassi
:
Classification of Web History Tools Through Web Analysis. 266-276 - Gavin Hales, Ethan Bayne

:
Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence. 277-293 - Aaron MacSween, Yann Flory:

Behind the Façade - Paradigms in Ubiquitous Cryptography. 294-313 - Bilal Naqvi, Ahmed Seffah:

Interdependencies, Conflicts and Trade-Offs Between Security and Usability: Why and How Should We Engineer Them? 314-324 - Megan Nyre-Yu, Kelly A. Sprehn, Barrett S. Caldwell:

Informing Hybrid System Design in Cyber Security Incident Response. 325-338 - Rukman Senanayake, Phillip A. Porras, Jason Kaehler:

Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions. 339-352
Privacy and Trust
- Ala Sarah Alaqra, Erik Wästlund:

Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors. 355-370 - Teresa Brell

, Hannah Biermann
, Ralf Philipsen
, Martina Ziefle
:
Trust in Autonomous Technologies - A Contextual Comparison of Influencing User Factors. 371-384 - Kaisei Kajita

, Kazuto Ogawa, Go Ohtake:
Privacy Preserving System for Real-Time Enriched-Integrated Service with Feedback to Providers. 385-403 - Mahsa Keshavarz, Mohd Anwar:

The Automatic Detection of Sensitive Data in Smart Homes. 404-416 - Kazuto Ogawa, Koji Nuida

:
Privacy Preservation for Versatile Pay-TV Services. 417-428 - Svenja Polst, Patricia Kelbert, Denis Feth:

Company Privacy Dashboards: Employee Needs and Requirements. 429-440 - Kirsten E. Richards:

Privacy and Power Implications of Web Location of Personal Data Authenticators. 441-451 - Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose F. Gamble, Sarah A. Jessup, August A. Capiola, Marc D. Pfahler:

Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust. 452-470 - Biao Wang, Shiquan Xiong, Shuping Yi, Qian Yi, Fangfei Yan:

Measuring Network User Trust via Mouse Behavior Characteristics Under Different Emotions. 471-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














