


default search action
HCI 2020: Copenhagen, Denmark
- Abbas Moallem:

HCI for Cybersecurity, Privacy and Trust - Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings. Lecture Notes in Computer Science 12210, Springer 2020, ISBN 978-3-030-50308-6
Human Factors in Cybersecurity
- May Almousa

, Mahsa Keshavarz, Mohd Anwar:
Awareness and Working Knowledge of Secure Design Principles: A User Study. 3-15 - Hamed AlQahtani, Manolya Kavakli-Thorne

, Majed Abdullah Alrowaily:
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR). 16-31 - Hamed AlQahtani, Manolya Kavakli-Thorne

:
Does Decision-Making Style Predict Individuals' Cybersecurity Avoidance Behaviour? 32-50 - Laura M. Bishop

, Phillip L. Morgan
, Phoebe M. Asquith
, George Raywood-Burke
, Adam Wedgbury
, Kevin Jones:
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design. 51-66 - David Blank, Ravi Kanth Kosuru

:
Building Connections for a Secure User Experience. 67-75 - John M. Blythe, Alan Gray, Emily Collins:

Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change? 76-91 - Kingberli Capellan, Manuel Condado, Isabel Morais, Patricia Morreale

:
Analyzing Cybersecurity Understanding Using a Brain Computer Interface. 92-104 - Lynne M. Coventry

, Dawn Branley-Bell
, Elizabeth Sillence
, Sabina Magalini
, Pasquale Mari
, Aimilia Magkanaraki
, Kalliopi Anastasopoulou
:
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour. 105-122 - Lauren S. Ferro

, Francesco Sapio
:
Another Week at the Office (AWATO) - An Interactive Serious Game for Threat Modeling Human Factors. 123-142 - Laheem Khan, Kovila P. L. Coopamootoo, Magdalene Ng:

Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice. 143-161 - Patrik Lif, Jacob Löfvenberg, Per Wikberg, Ove Jansson:

Development of a Test Battery for Cyber Soldiers. 162-174 - Birgy Lorenz

, Kaido Kikkas
:
"Trust Me, You Will Need It": Cybersecurity as Extracurricular Subject at Estonian Schools. 175-188 - Heather Molyneaux, Elizabeth Stobert, Irina Kondratova

, Manon Gaudet:
Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors. 189-205 - Phillip L. Morgan

, Phoebe M. Asquith
, Laura M. Bishop
, George Raywood-Burke
, Adam Wedgbury
, Kevin Jones:
A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations. 206-216 - Andrew Reeves

, Dragana Calic
, Paul H. Delfabbro
:
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity? 217-231 - Andrew Reeves

, Kathryn Parsons
, Dragana Calic
:
Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness? 232-249 - Luis Martín Sánchez-Adame

, Sonia Mendoza
, Beatriz A. González-Beltrán
, Amilcar Meneses-Viveros
, José Rodríguez
:
The Man in the Besieged Castle: Heuristic Evaluation of Home Security Systems. 250-260 - Artem Voronkov, Leonardo A. Martucci:

Natural vs. Technical Language Preference and Their Impact on Firewall Configuration. 261-270 - Adam Wójtowicz

, Jacek Chmielewski
:
Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce. 271-284
Privacy and Trust
- Panagiotis Andriotis

, Atsuhiro Takasu
:
To Allow, or Deny? That is the Question. 287-304 - George Chalhoub

, Ivan Flechais:
"Alexa, Are You Spying on Me?": Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users. 305-325 - Susen Döbelt, Josephine Halama, Sebastian Fritsch, Minh-Hoang Nguyen, Franziska Bocklisch

:
Clearing the Hurdles: How to Design Privacy Nudges for Mobile Application Users. 326-353 - Denis Feth:

Modelling and Presentation of Privacy-Relevant Information for Internet Users. 354-366 - Shadan Ghaffaripour, Ali Miri:

Enabling Medical Research Through Privacy-Preserving Data Markets. 367-380 - Charulata Ghosh, Matthew S. Eastin:

Understanding Users' Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior. 381-392 - Julie M. Haney, Susanne M. Furman, Yasemin Acar:

Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. 393-411 - Sarah A. Jessup, Gene M. Alarcon, August A. Capiola, Tyler J. Ryan:

Multi-method Approach Measuring Trust, Distrust, and Suspicion in Information Technology. 412-426 - Edden Kashi, Angeliki Zavou:

Did I Agree to This? Silent Tracking Through Beacons. 427-444 - Holger Koelmann

:
Perspectives on Information Technology Artefacts in Trust-Related Interactions. 445-457 - Kaur Kullman

, Laurin Buchanan, Anita Komlodi, Don Engel
:
Mental Model Mapping Method for Cybersecurity. 458-470 - Suzanne Prior, Natalie Coull

:
Parents Unwittingly Leak Their Children's Data: A GDPR Time Bomb? 471-486 - Fatema Rashid, Ali Miri:

An Emerging Strategy for Privacy Preserving Databases: Differential Privacy. 487-498 - Kirsten E. Richards:

Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability. 499-512 - Eva-Maria Schomakers

, Hannah Biermann
, Martina Ziefle
:
Understanding Privacy and Trust in Smart Home Environments. 513-532 - Tanusree Sharma, Masooda N. Bashir

:
Privacy Apps for Smartphones: An Assessment of Users' Preferences and Limitations. 533-546 - Rodolfo Ward

, Cleomar Rocha
, Suzete Venturelli:
Cyberspace and Cyberculture: The New Social and Governance Field. 547-557
Usable Security Approaches
- Kokoro Kobayashi

, Tsuyoshi Oguni, Masaki Nakagawa
:
Evaluation of Secure Pad Resilient to Shoulder Hacking. 561-574 - Michael Kubach

, Heiko Roßnagel
:
Smart Assistants in IT Security - An Approach to Addressing the Challenge by Leveraging Assistants' Specific Features. 575-587 - Wei Li, Shuping Yi, Qian Yi, Jiajia Li, Shiquan Xiong:

An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication. 588-598 - Jens Mehrfeld:

Cyber Security Threats and Incidents in Industrial Control Systems. 599-608 - Bilal Naqvi

, Jari Porras
:
Usable Security by Design: A Pattern Approach. 609-618 - Katie Paxton-Fear

, Duncan Hodges
, Oliver Buckley
:
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks. 619-636 - Emanuel Schmitt, Jan-Niklas Voigt-Antons

:
Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor Readings. 637-651 - Akihiro Tachikawa, Akira Kanaoka:

Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions. 652-670 - Yuhan Wang, Qian Yi, Shuping Yi, Jiajia Li, Shiquan Xiong:

Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network. 671-682

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














