


default search action
HCI 2023: Copenhagen, Denmark - Volume 35
- Abbas Moallem:

HCI for Cybersecurity, Privacy and Trust - 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings. Lecture Notes in Computer Science 14045, Springer 2023, ISBN 978-3-031-35821-0
Usable Security and Privacy
- Ala Sarah Alaqra

, Simone Fischer-Hübner
, Farzaneh Karegar
:
Transparency of Privacy Risks Using PIA Visualizations. 3-17 - Marissa Berk, Tamara Marantika, Daan Oldenhof, Marcel Stalenhoef, Erik Hekman, Levien Nordeman, Simone van der Hof, Linda Louis, Aletta Smits

, Koen van Turnhout:
Overcoming Privacy-Related Challenges for Game Developers. 18-28 - Yee-Yin Choong

, Kerrianne Buchanan
, Olivia Williams
:
Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children's Password Practices. 29-48 - Wesam Fallatah, Steven Furnell, Ying He:

Refining the Understanding of Usable Security. 49-67 - Kazutoshi Itoh, Akira Kanaoka:

Survey of Services that Store Passwords in a Recoverable Manner. 68-77 - Akira Kanaoka:

(I Can't Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy. 78-89 - Jaka Raharja, Achmad Nurmandi, Misran, Dimas Subekti:

Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH (Voter Data Information System) Application. 90-100 - Ankit Shrestha

, Rizu Paudel, Prakriti Dumaru, Mahdi Nasrullah Al-Ameen:
Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of Rhetoric. 101-121
Data Privacy, Sovereignty and Governance
- Ruichen Cong

, Yaping Ye
, Jianlun Wu
, Yuxi Li
, Yuerong Chen
, Yishan Bian
, Kiichi Tago
, Shoji Nishimura
, Atsushi Ogihara
, Qun Jin
:
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental Validation. 125-134 - Denis Feth

:
Usable Implementation of Data Sovereignty in Digital Ecosystems. 135-150 - Zimeng Gao, Fei Xing, Guochao Peng:

Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation. 151-162 - Julie M. Haney

, Sandra Spickard Prettyman, Mary Frances Theofanos
, Susanne M. Furman
:
Data Guardians' Behaviors and Challenges While Caring for Others' Personal Data. 163-183 - Khutso Lebea

, Wai Sze Leung
:
A Privacy-Orientated Distributed Data Storage Model for Smart Homes. 184-193 - Luca Mazzola

, Atreya Shankar
, Christof Bless
, Maria A. Rodriguez
, Andreas Waldis
, Alexander Denzler
, Michiel Van Roey:
A Question Answering Tool for Website Privacy Policy Comprehension. 194-212 - Luisa Vervier

, Philipp Brauner
, Martina Ziefle
:
Perception of Privacy and Willingness to Share Personal Data in the Smart Factory. 213-231 - Yenjou Wang

, Ruichen Cong
, Yixiao Liu
, Kiichi Tago
, Ruidong Li
, Hitoshi Asaeda
, Qun Jin
:
Multi-ledger Coordinating Mechanism by Smart Contract for Individual-Initiated Trustworthy Data Sharing. 232-243
Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies
- Hebah A. Albatati, John A. Clark, Maysoon F. Abulkhair:

Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia. 247-261 - Yonas Zewdu Ayele, Sabarathinam Chockalingam

, Nathan Lau
:
Threat Actors and Methods of Attack to Social Robots in Public Spaces. 262-273 - Maria Bada

, Steven Furnell
, Jason R. C. Nurse
, Jason Dymydiuk
:
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies. 274-289 - Gordon J. Bruce:

Cybersecurity Compliance Requirements for USA Department of Defense Contractors - Dragons at the Gate. 290-308 - Arnoldas Budzys

, Olga Kurasova
, Viktor Medvedev
:
Behavioral Biometrics Authentication in Critical Infrastructure Using Siamese Neural Networks. 309-322 - Victoria Marcinkiewicz

, Phillip L. Morgan
:
Trust and Blame in Self-driving Cars Following a Successful Cyber Attack. 323-337 - John Brian Pickering

, Stephen C. Phillips
, Gencer Erdogan
:
I Just Want to Help: SMEs Engaging with Cybersecurity Technology. 338-352 - David Stevens

, Richard Halverson:
Business Continuity Planning (BCP) for Election Systems. 353-367 - Joel Wilf

:
Cybersecurity as Part of Mission Assurance. 368-377
User-Centered Perspectives on Privacy and Security in Digital Environments
- Rufai Ahmad

, Sotirios Terzis
, Karen Renaud
:
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures. 381-398 - Abdulmajeed Alqhatani, Heather Richter Lipford:

Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness Trackers. 399-418 - Umai Balendra, Sana Maqsood:

User Motivations of Secure Web Browsing. 419-434 - Debasis Bhattacharya

, Jodi Ito:
Working for Home - Privacy and Confidentiality Issues in University Education. 435-446 - Francisco Corella:

Overcoming the UX Challenges Faced by FIDO Credentials in the Consumer Space. 447-466 - Dandi Feng, Hiba Rafih, Cosmin Munteanu:

Understanding Older Adults' Safety Perceptions and Risk Mitigation Strategies when Accessing Online Services. 467-491 - Julie M. Haney

, Susanne M. Furman
:
Smart Home Device Loss of Support: Consumer Perspectives and Preferences. 492-510 - David Jones

, Shiva Ghasemi
, Denis Gracanin
, Mohamed Azab
:
Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users. 511-528 - Aysun Ogut

:
"Stay Out of My Way!": The Impact of Cookie Consent Notice Design on Young Users' Decision. 529-541 - Hana Yousuf, Mostafa Al-Emran, Khaled Shaalan:

Evaluating Individuals' Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity Awareness. 542-554
Human-Centric Cybersecurity: From Intrabody Signals to Incident Management
- Nourah Alshomrani, Steven Furnell, Ying He:

Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings. 557-575 - Sabarathinam Chockalingam

, Espen Nystad, Coralie Esnoul:
Capability Maturity Models for Targeted Cyber Security Training. 576-590 - Sukhi Chuhan, Veronica Wojnas:

Designing and Evaluating a Resident-Centric Digital Wallet Experience. 591-609 - Ulku Clark, Jeff Greer, Rahmira Rufus, Geoff Stoker:

A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use. 610-621 - Priscilla Kyei Danso

, Heather Molyneaux, Alireza Zohourian, Euclides Carlos Pinto Neto, Derrick Whalen, Sajjad Dadkhah, Ali A. Ghorbani:
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment. 622-642 - Zeth Dubois

, Roger T. Lew, Ronald L. Boring
:
Fail-Safe Automatic Timed Response Protocol for Cyber Incident and Fault Management. 643-655 - Shodai Kurasaki, Akira Kanaoka:

Analysis of Country and Regional User Password Characteristics in Dictionary Attacks. 656-671 - Kasey Miller, Johnathan Mun:

Cyber Technologies, Machine Learning, Additive Manufacturing, and Cloud in the Box to Enable Optimized Maintenance Processes in Extreme Conditions. 672-684 - Isao Nakanishi

, Tomoaki Oku, Souta Okasaka:
Person Verification Based on Multipoint Measurement of Intrabody Propagation Signals. 685-700

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














