


default search action
HCI 2022: Virtual Event - Volume 32
- Abbas Moallem:

HCI for Cybersecurity, Privacy and Trust - 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13333, Springer 2022, ISBN 978-3-031-05562-1
User Privacy and Data Protection
- Hanieh Atashpanjeh, Arezou Behfar, Cassity Haverkamp, Maryellen McClain Verdoes, Mahdi Nasrullah Al-Ameen:

Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young Adults. 3-15 - Cong Cao

, Miaomiao Zheng, Linyao Ni:
Improving Consumer Data Privacy Protection and Trust in the Context of the Digital Platform. 16-29 - Ruichen Cong

, Yixiao Liu
, Yenjou Wang
, Kiichi Tago
, Ruidong Li
, Hitoshi Asaeda
, Qun Jin
:
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE. 30-41 - Alexandra Mai, Leonard Guelmino, Katharina Pfeffer, Edgar R. Weippl

, Katharina Krombholz:
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). 42-61 - Luca Mazzola

, Andreas Waldis
, Atreya Shankar
, Diamantis Argyris, Alexander Denzler, Michiel Van Roey:
Privacy and Customer's Education: NLP for Information Resources Suggestions and Expert Finder Systems. 62-77 - Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki

:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. 78-93 - Temechu Girma Zewdie, Anteneh Girma:

Securing Software Defining Network from Emerging DDoS Attack. 94-103
Trustworthiness and User Experience in Cybersecurity
- Maria Chaparro Osman

, Andrew Nakushian
, Summer Rebensky
, Tricia Prior
, Meredith B. Carroll
:
User Experience, Knowledge, Perceptions, and Behaviors Associated with Internet of Things (IoT) Device Information Privacy. 107-123 - Shreya Gupta

, Steven Furnell
:
From Cybersecurity Hygiene to Cyber Well-Being. 124-134 - Julie M. Haney

, Jody L. Jacobs
, Fernando Barrientos, Susanne M. Furman
:
Lessons Learned and Suitability of Focus Groups in Security Information Workers Research. 135-153 - Danielle Renee Jacobs

, Troy McDaniel
:
A Survey of User Experience in Usable Security and Privacy Research. 154-172 - Alexandra Mai, Oliver Schedler, Edgar R. Weippl

, Katharina Krombholz:
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations. 173-193 - Sadaira Packer, Cheryl D. Seals, Gerry V. Dozier:

Towards the Improvement of UI/UX of a Human-AI Adversarial Authorship System. 194-205
Multi-faceted Authentication Methods and Tools
- Panagiotis Andriotis

, Myles Kirby, Atsuhiro Takasu
:
Bu-Dash: A Universal and Dynamic Graphical Password Scheme. 209-227 - Oluwadamilola Arinde, Jinjuan Feng

, Ziying Tang:
A Preliminary Investigation of Authentication of Choice in Health-Related Mobile Applications. 228-240 - Isao Nakanishi

:
On-Demand Biometric Authentication for System-User Management. 241-254 - Youngeun Song

, Ian Oakley
:
PushID: A Pressure Control Interaction-Based Behavioral Biometric Authentication System for Smartwatches. 255-267 - Hideaki Terui, Hiroshi Hosobe

:
A Hand Gesture-Based Authentication Method that Makes Forgery Difficult. 268-279 - Manisha Varma, Stacey Watson, Liwei Chan, Roshan Lalintha Peiris

:
VibroAuth: Authentication with Haptics Based Non-visual, Rearranged Keypads to Mitigate Shoulder Surfing Attacks. 280-303
HCI in Cyber Defense and Protection
- Asmaa Aljohani

, James Jones:
The Pitfalls of Evaluating Cyber Defense Techniques by an Anonymous Population. 307-325 - Morgan L. Ferretti, Timothy Richards, Jessica G. Irons, Kirsten Richards:

The Dimensionality of the Cyber Warrior. 326-339 - Florian Kammüller, Chelsea Mira Alvarado:

Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders. 340-357 - Jennifer A. McKneely

, Tara K. Sell, Kathleen A. Straub, Mika D. Ayenson, Daniel Thomas:
Shaping Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework. 358-379
Studies on Usable Security in Intelligent Environments
- Leena Alghamdi, Ashwaq Alsoubai, Mamtaj Akter

, Faisal Alghamdi, Pamela J. Wisniewski
:
A User Study to Evaluate a Web-Based Prototype for Smart Home Internet of Things Device Management. 383-405 - Laura Lynggaard Nielsen:

What Makes IoT Secure? A Maturity Analysis of Industrial Product Manufacturers' Approaches to IoT Security. 406-421 - Michael Shlega, Sana Maqsood, Sonia Chiasson:

Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and Adoption. 422-443 - Markus Frogner Werner, Ida Ness, Cristina Paupini

:
Privacy in the Smart Household: Towards a Risk Assessment Model for Domestic IoT. 444-454
The Impact of the Covid-19 Pandemic on Cybersecurity
- Nirmal Acharya

, Abhishek Sharma
:
Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model. 457-468 - Ardiansyah, M. Rafi

, Pahmi Amri:
The Importance of Strengthening Legal Concepts in Overcoming Cybercrime During the Covid-19 Pandemic in Indonesia. 469-479 - Abhishek Sharma

, Chandana Hewege, Chamila Perera:
Exploration of Privacy, Ethical and Regulatory Concerns Related to COVID-19 Vaccine Passport Implementation. 480-491 - Tian Wang, Masooda N. Bashir

:
Attitudes Towards the Use of COVID-19 Apps and Its Associated Factors. 492-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














