Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings / edited by Theo Tryfonas, Ioannis Askoxylakis.

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar themati...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Tryfonas, Theo (Editor), Askoxylakis, Ioannis (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edition:1st ed. 2014.
Series:Information Systems and Applications, incl. Internet/Web, and HCI ; 8533
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3282381
003 MWH
005 20191029011517.0
007 cr nn 008mamaa
008 140607s2014 gw | s |||| 0|eng d
020 |a 9783319076201 
024 7 |a 10.1007/978-3-319-07620-1  |2 doi 
035 |a (DE-He213)978-3-319-07620-1 
050 4 |a E-Book 
072 7 |a UY  |2 bicssc 
072 7 |a COM069000  |2 bisacsh 
072 7 |a UY  |2 thema 
245 1 0 |a Human Aspects of Information Security, Privacy, and Trust  |h [electronic resource] :  |b Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings /  |c edited by Theo Tryfonas, Ioannis Askoxylakis. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XXII, 448 p. 129 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 8533 
490 1 |a Springer eBook Collection 
505 0 |a Usable Security -- On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security -- A Network Telescope for Early Warning Intrusion Detection -- Visualization of System Log Files for Post-incident Analysis and Response -- An Assessment Framework for Usable-Security Based on Decision Science -- On Designing Usable Policy Languages for Declarative Trust Aggregation -- An Image-Based CAPTCHA Using Sophisticated Mental Rotation -- What Usable Security Really Means: Trusting and Engaging Users -- QR Code Security: A Survey of Attacks and Challenges for Usable Security -- Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India -- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security -- Authentication and Passwords Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method -- A Cognitive-Behavioral Framework of User Password Management Lifecycle -- Do Graphical Authentication Systems Solve the Password Memorability Problem -- E-voting Authentication with QR-codes -- I Can’t Type That! P@$$w0rd Entry on Mobile Devices -- Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention -- ACCESS: Describing and Contrasting – Authentication Mechanisms -- Character Strings, Memory and Passwords: What a Recall Study Can Tell Us -- Security Policy and Awareness -- From Regulations to Practice: Achieving Information Security Compliance in Healthcare -- Rethinking the Smart Card Technology -- Compositional Security Modelling: Structure, Economics, and Behaviour -- End User Development and Information Security Culture -- DSAPE – Dynamic Security Awareness Program Evaluation -- A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches -- Changing Faces: Identifying Complex Behavioural Profiles -- Human Behaviour in Cybersecurity -- A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations -- Socio-technical Security Analysis of Wireless Hotspots -- A Conceptual Framework to Study Socio-Technical Security -- An Evaluation of Behavioural Profiling on Mobile Devices -- Nudging for Quantitative Access Control Systems -- Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior -- The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role of Security Culture -- Privacy Issues -- User Acceptance of Privacy-ABCs: An Exploratory Study -- “My Life Doesn’t Have to Be an Open Book”: A Model to Help Designers to Enhance Privacy Controls on Social Network Sites -- Paper Audit Trails and Voters’ Privacy Concerns -- Mental Models for Usable Privacy: A Position Paper -- Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users -- Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks. 
520 |a This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computers. 
650 0 |a Computer security. 
650 0 |a User interfaces (Computer systems). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Information storage and retrieval. 
650 0 |a Application software. 
690 |a Electronic resources (E-books) 
700 1 |a Tryfonas, Theo.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Askoxylakis, Ioannis.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 8533 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-319-07620-1  |3 Click to view e-book  |t 0 
907 |a .b32823812  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21955438  |z 02-26-20 
999 f f |i 54301ed3-036c-5b32-93c6-2b73ff552621  |s df6f0941-e1cd-5978-ad45-46feafefc5a3  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File