


default search action
17th HCI 2015: Los Angeles, CA, USA
- Theo Tryfonas

, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings. Lecture Notes in Computer Science 9190, Springer 2015, ISBN 978-3-319-20375-1
Authentication
- Sarah N. Abdulkader, Ayman Atia

, Mostafa-Sami M. Mostafa:
Single Trial Authentication with Mental Password Writing. 3-12 - Alexander Chan, Tzipora Halevi, Nasir D. Memon

:
Leap Motion Controller for Authentication via Hand Geometry and Gestures. 13-22 - Matthieu Devlin, Jason R. C. Nurse, Duncan Hodges

, Michael Goldsmith, Sadie Creese:
Predicting Graphical Passwords. 23-35 - Ana Ferreira

, Lynne M. Coventry
, Gabriele Lenzini:
Principles of Persuasion in Social Engineering and Their Use in Phishing. 36-47 - Masahiro Fujita, Yuki Ikeya, Junya Kani, Masakatsu Nishigaki

:
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objects. 48-58 - Kristen K. Greene:

Effects of Password Permutation on Subjective Usability Across Platforms. 59-70 - Kat Krol, Constantinos Papanicolaou, Alexei Vernitski, Martina Angela Sasse:

"Too Taxing on the Mind!" Authentication Grids are not for Everyone. 71-82 - Paul Y. Lee, Yee-Yin Choong:

Human Generated Passwords - The Impacts of Password Requirements and Presentation Styles. 83-94 - Cathryn A. Ploehn, Kristen K. Greene:

The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords. 95-106 - Lakshmidevi Sreeramareddy, Pewu Mulbah, Jinjuan Heidi Feng

:
Investigating the Use of Gesture-Based Passwords by the Seniors. 107-118 - Michelle Steves, Mary Theofanos, Celia Paulsen, Athos Ribeiro:

Password Policy Languages: Usable Translation from the Informal to the Formal. 119-130 - Abrar Ullah, Hannan Xiao

, Trevor Barker
:
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication. 131-140
Cybersecurity
- François-Xavier Aguessy, Olivier Bettan, Romuald Dobigny, Claire Laudy, Gaëlle Lortal, David Faure:

Adjustable Fusion to Support Cyber Security Operators. 143-153 - Stefan Bauer, Edward W. N. Bernroider

:
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring. 154-164 - Luca Caviglione

, Jean-François Lalande
, Wojciech Mazurczyk
, Steffen Wendzel
:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. 165-177 - Taolue Chen

, Florian Kammüller, Ibrahim Nemli, Christian W. Probst
:
A Probabilistic Analysis Framework for Malicious Insider Threats. 178-189 - Zdenek Eichler, Radek Oslejsek

, Dalibor Toth:
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environment. 190-199 - Shelby Hopkins, Andrew Wilson, Austin Silva, J. Chris Forsythe:

Factors Contributing to Performance for Cyber Security Forensic Analysis. 200-206 - Georgios Makrodimitris, Christos Douligeris:

Towards a Successful Exercise Implementation - A Case Study of Exercise Methodologies. 207-218 - Spyridon Papastergiou, Nineta Polemi, Athanasios Karantjias:

CYSM: An Innovative Physical/Cyber Security Management System for Ports. 219-230 - Malcolm Robert Pattinson, Marcus A. Butavicius, Kathryn Parsons, Agata McCormac, Dragana Calic:

Factors that Influence Information Security Behavior: An Australian Web-Based Study. 231-241 - Dana Polatin-Reuben:

Pervasive Monitoring as an Insider Threat - An Adapted Model. 242-251 - Christian Sillaber, Ruth Breu:

Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis. 252-259 - Sandra Spickard Prettyman, Susanne Furman, Mary Theofanos, Brian C. Stanton:

Privacy and Security in the Brave New World: The Use of Multiple Mental Models. 260-270 - Shenja van der Graaf

, Wim Vanobberghen
, Michalis Kanakakis, Costas Kalogiros:
Usable Trust: Grasping Trust Dynamics for Online Security as a Service. 271-283
Privacy, Security and User Behaviour
- Nasser O. Alshammari, Alexios Mylonas

, Mohamed H. Sedky
, Justin Champion, Carolin Bauer:
Exploring the Adoption of Physical Security Controls in Smartphones. 287-298 - Yee-Yin Choong, Mary Theofanos:

What 4, 500+ People Can Tell You - Employees' Attitudes Toward Organizational Password Policy Do Matter. 299-310 - Shruti Devaraj, Myrtede Alfred

, Kapil Chalil Madathil, Anand K. Gramopadhye:
An Investigation of the Factors that Predict an Internet User's Perception of Anonymity on the Web. 311-322 - Ana Ferreira

, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Do Graphical Cues Effectively Inform Users? - A Socio-Technical Security Study in Accessing Wifi Networks. 323-334 - Yasser M. Hausawi, William H. Allen

:
Usable-Security Evaluation. 335-346 - Thomas Hughes-Roberts:

Reminding Users of their Privacy at the Point of Interaction: The Effect of Privacy Salience on Disclosure Behaviour. 347-356 - Costas Kalogiros, Michalis Kanakakis, Shenja van der Graaf

, Wim Vanobberghen
:
Profit-Maximizing Trustworthiness Level of Composite Systems. 357-368 - Lotus Lee, Jeremiah D. Still

:
Re-designing Permission Requirements to Encourage BYOD Policy Adherence. 369-378 - Shancang Li, Junhua Chen, Theodoros Spyridopoulos

, Panagiotis Andriotis
, Robert Ludwiniak, Gordon Russell
:
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. 379-390 - Marília Soares Mendes, Elizabeth Furtado

, Guido Militao, Miguel F. de Castro
:
Hey, I Have a Problem in the System: Who Can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy Problems. 391-403 - Huw Read

, Konstantinos Xynos
, Iain Sutherland
, Frode Roarson, Panagiotis Andriotis
, George C. Oikonomou
:
An Extensible Platform for the Forensic Analysis of Social Media Data. 404-414 - David Schuster

, Mary L. Still
, Jeremiah D. Still
, Ji Jung Lim, Cary S. Feria, Christian P. Rohrer:
Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security. 415-425 - Mythreya Seetharama, Volker Paelke, Carsten Röcker:

SafetyPIN: Secure PIN Entry Through Eye Tracking. 426-435 - Emad Sherif

, Steven Furnell
, Nathan L. Clarke
:
An Identification of Variables Influencing the Establishment of Information Security Culture. 436-448 - Patricia Cristiane de Souza, Cristiano Maciel

:
Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective. 449-460
Security in Social Media and Smart Technologies
- Claudia Z. Acemyan, Philip T. Kortum, Michael D. Byrne, Dan S. Wallach:

Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II. 463-474 - Panagiotis Andriotis

, George C. Oikonomou
:
Messaging Activity Reconstruction with Sentiment Polarity Identification. 475-486 - Chris S. Crawford

, Naja A. Mack, Wanda Eugene, Juan E. Gilbert
:
Televoting: Secure, Overseas Voting. 487-494 - Shaneé Dawkins, Sharon J. Laskowski:

Personalized Voting: The Intersection of Cloud and Mobility. 495-505 - John Haggerty, Thomas Hughes-Roberts, Robert Hegarty

:
Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices. 506-516 - Elahe Kani-Zabihi

, Lizzie Coles-Kemp, Martin Helmhout:
Information Presentation: Considering On-line User Confidence for Effective Engagement. 517-525 - Ella Kolkowska:

Privacy Principles in Design of Smart Homes Systems in Elderly Care. 526-537 - Noluntu Mpekoa

, Aaron Bere:
An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting System. 538-546 - Alexander Novotny

:
Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual Integrity. 547-558 - Whitney Quesenbery, Dana Chisnell:

Poll Workers and Election Integrity: Security as if People Mattered. 559-569 - Teresa Schmidt

, Ralf Philipsen
, Martina Ziefle:
From V2X to Control2Trust - Why Trust and Control Are Major Attributes in Vehicle2X Technologies. 570-581 - Sarah J. Swierenga, Rebecca S. Zantjer, James E. Jackson, Jennifer Ismirle, Stephen R. Blosser, Graham L. Pierce:

Security Implications for Personal Assistive Technology in Voting. 582-591 - Wiktoria Wilkowska

, Martina Ziefle, Simon Himmel:
Perceptions of Personal Privacy in Smart Home Technologies: Do User Assessments Vary Depending on the Research Method? 592-603
Security Technologies
- Chrysovalandis Agathangelou, Chryssis Georgiou

, Ileana Papailiou, Anna Philippou, Loucas Pouis, Georgios Tertytchny, Despina Vakana:
Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri Nets. 607-618 - Konstantinos Fysarakis

, George Hatzivasilis
, Ioannis G. Askoxylakis, Charalampos Manifavas:
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems. 619-630 - Ulrike Hugl:

Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime Research. 631-641 - Spyridon Papastergiou, Nineta Polemi, Ioannis Papagiannopoulos:

Business and Threat Analysis of Ports' Supply Chain Services. 642-653 - Teresa Susana Mendes Pereira

, Henrique Santos
:
Insider Threats: The Major Challenge to Security Risk Management. 654-663 - Brian C. Stanton, Mary Theofanos, Karuna P. Joshi:

Framework for Cloud Usability. 664-671 - George Stergiopoulos

, Marianthi Theocharidou
, Dimitris Gritzalis:
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures. 672-683 - Iain Sutherland

, Theodoros Spyridopoulos
, Huw Read
, Andy Jones, Graeme Sutherland, Mikhailia Burgess:
Applying the ACPO Guidelines to Building Automation Systems. 684-692 - Jernej Tonejc, Jaspreet Kaur, Adrian Karsten, Steffen Wendzel

:
Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making. 693-704 - Nils Ulltveit-Moe, Henrik Nergaard, Terje Gjøsæter, Jennifer Betts:

XACML Privacy Policy Editor for Critical Infrastructures. 705-716

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














