


default search action
HCI 2024: Washington, DC, USA - Volume 45
- Abbas Moallem:

HCI for Cybersecurity, Privacy and Trust - 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29 - July 4, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14728, Springer 2024, ISBN 978-3-031-61378-4
Cyber Hygiene, User Behavior and Security Awareness
- Eman Alashwali, Lorrie Cranor:

Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia. 3-29 - Arwa Binsedeeq, Steven Furnell, Xavier Carpent, Nicholas Gervassis

:
Seek and Locate? Examining the Accessibility of Cybersecurity Features. 30-42 - Cameron Gray

, Steven Furnell
:
Enhancing Cyber Hygiene and Literacy via Interactive Mini-games. 43-52 - Alex Katsarakes, Thomas Morris, Jeremiah D. Still:

Hidden in Onboarding: Cyber Hygiene Training and Assessment. 53-63 - Paola Marmorato, Clarissa Fernandes, Lydia Kraus, Elizabeth Stobert:

"I'm not planning on dying anytime soon!": A Survey of Digital Legacy Planning. 64-76 - Suzanne Prior

, Karen Renaud
:
Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities? 77-96 - Deborah Taylor

, Clare Melvin
, Hane Aung
, Rameez Asif
:
To Bot or Not to Bot?: Analysing Mental Health Data Disclosures. 97-115 - Ezgi Tugcu

, Steven Furnell
:
Exploring User Understanding of Wireless Connectivity and Security on Smartphones. 116-125 - Rick van der Kleij

, Tineke Hof
:
Why Do Organizations Fail to Practice Cyber Resilience? 126-137 - Tafheem Ahmad Wani

, Antonette Mendoza
, Kathleen Gray
:
BYOD Security Practices in Australian Hospitals - A Qualitative Study. 138-158
User Privacy and Security Acceptance
- Nanik Prasetyoningsih

, Nazli Ismail Nawang
, Windy Virdinia Putri
, Muhammad Nur Rifqi Amirullah
:
Legal Protection for the Personal Data in Indonesia and Malaysia. 161-169 - Samiah Alghamdi, Steven Furnell, Steven R. Bagley:

Towards a Harmonised Approach for Security and Privacy Management in Smart Home Contexts. 170-187 - Yomna Aly, Cosmin Munteanu:

Privacy-Conscious Design Requirements to Support Older Adults' Health Information Seeking. 188-211 - Daniela Azevedo

, Justine Ramelot
, Axel Legay
, Suzanne Kieffer
:
With or Without U(sers): A Journey to Integrate UX Activities in Cybersecurity. 212-231 - David Brookshire Conner

:
Using a Digital Transformation to Improve Enterprise Security - A Case Study. 232-244 - Sachiko Kanamori

, Miho Ikeda
, Kumiko Kameishi
, Ayako Akiyama Hasegawa
:
Japanese Users' (Mis)understandings of Technical Terms Used in Privacy Policies and the Privacy Protection Law. 245-264 - Jing Luo, Xin Zhang, Fang Fu, Hanxiao Geng:

Alert Interaction Service Design for AI Face Swap Video Scams. 265-280 - Sanjay Misra, Kousik Barik

, Harald P.-J. Thunem, Sabarathinam Chockalingam
:
Human Factors and Security in Digital Twins: Challenges and Future Prospects. 281-295 - Benjamin L. Schooley, Derek Hansen, Ethan James Richmond, Malaya Jordan Canite, Nimrod Max Huaira Reyna:

Visualizing Cybersecurity Diagrams: An Empirical Analysis of Common Weakness Enumeration Images. 296-317

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














