Coverart for item
The Resource HCI for cybersecurity, privacy and trust : first International Conference, HCI-CPT 2019, held as part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings, Abbas Moallem (Ed.)

HCI for cybersecurity, privacy and trust : first International Conference, HCI-CPT 2019, held as part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings, Abbas Moallem (Ed.)

Label
HCI for cybersecurity, privacy and trust : first International Conference, HCI-CPT 2019, held as part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings
Title
HCI for cybersecurity, privacy and trust
Title remainder
first International Conference, HCI-CPT 2019, held as part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings
Statement of responsibility
Abbas Moallem (Ed.)
Title variation
HCI-CPT 2019
Creator
Contributor
Author
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust. --
Member of
Assigning source
Provided by publisher
Cataloging source
YDX
Dewey number
004.01/9
Index
index present
LC call number
QA76.9.H85
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2019
http://bibfra.me/vocab/lite/meetingName
HCI for cybersecurity, privacy and trust (Conference)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
2019
http://library.link/vocab/relatedWorkOrContributorName
  • Moallem, Abbas
  • International Conference on Human-Computer Interaction
Series statement
  • Lecture notes in computer science
  • LNCS Sublibrary: SL3 - Information systems and applications, incl. internet/web, and HCI
Series volume
11594
http://library.link/vocab/subjectName
  • Human-computer interaction
  • Computer security
Label
HCI for cybersecurity, privacy and trust : first International Conference, HCI-CPT 2019, held as part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings, Abbas Moallem (Ed.)
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Identity verification using face recognition for artificial-intelligence electronic forms with speech interaction
  • Akitoshi Okumura, Shuji Komeiji, Motohiko Sakaguchi, Masahiro Tabuchi, and Hiroaki Hattori
  • BREAKING : password entry is fine
  • Catlin Pidel and Stephan Neuhaus
  • Explore-a-nation : combining graphical and alphanumeric authentication
  • Lauren N. Tiller, Catherine A. Angelini, Sarah C. Leibner, and Jeremiah D. Still
  • [I].
  • Authentication:
  • Grid authentication : a memorability and user sentiment study
  • Paul Biocco and Mohd Anwar
  • Consonant-vowel-consonant for error-free code entry
  • Nikola K. Blanchard, Leila Gabasova, and Ted Selker
  • Two-factor authentication using leap motion and numeric keypad
  • Tomoki Manabe and Hayato Yamana
  • Social preferences in decision making under cybersecurity risks and uncertainties
  • Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, and Christopher Frantz
  • Understanding perceptions : user responses to browser warning messages
  • Heather Molyneaux, Irina Kondratova, and Elizabeth Stobert
  • Understanding parents' concerns with smart device usage in the home
  • Aarathi Prasad, Ruben Ruiz, and Timothy Stablein
  • Gamification techniques for raising cyber security awareness
  • Sam Scholefield and Lynsay A. Shepherd
  • An identification method of untrusted interactive behavior in ERP system based on Markov chain
  • Mengyao Xu, Qian Yi, Shuping Yi, and Shiquan Xiong
  • [II].
  • Cybersecurity awareness and behavior:
  • From cyber-security deception to manipulation and gratification through gamification
  • Xavier Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, and Robert Atkinson
  • Gamifying security awareness : a new prototype
  • John Russell Cole, Toni Pence, Jeffrey Cummings, and Elizabeth Baker
  • Alertin users about phishing attacks
  • Giuseppe Desolda, Francesco Di Nocera, Lauren Ferro, Rosa Lanzilotti, Piero Maggi, and Andrea Marrella
  • Classification of web history tools through web analysis
  • João Rafael Gonçalves Evangelista, Dacyr Dante de Oliveira Gatto, and Renato José Sassi
  • Investigating visualisation techniques for rapid triage of digital forensic evidence
  • Gavin Hales and Ethan Bayne
  • Behind the façade : paradigms in ubiquitous cryptography
  • Aaron MacSween and Yann Flory
  • Interdependencies, conflicts and trade-offs between security and usability : why and how should we engineer them?
  • Bilal Naqvi and Ahmed Seffah
  • Informing hybrid system design in cyber security incident response
  • Megan Nyre-Yu, Kelly A. Sprehn, and Barrett S. Caldwell
  • [III].
  • Revolutionizing the visual design of capture the flag (CTF) competitions
  • Rukman Senanayake, Phillip Porras, and Jason Kaehler
  • Security and usability:
  • A framework of information security integrated with human factors
  • Ahmed I. Al-Darwish and Pilsung Choe
  • Making sense of Darknet markets : automatic inference of emantic classifications from unconventional multimedia datasets
  • Alexander Berman and Celeste Lyn Paul
  • Policy creation for enterprise-level data sharing
  • Linda Briesemeister, Woodrow Gustafson, Grit Denker, April Martin, Karsten Martiny, Ron Moore, Dusko Pavlovic, and Mark St. John
  • The automatic detection of sensitive data in smart homes
  • Mahsa Keshavarz and Mohd Anwar
  • Privacy preservation for versatile pay-TV services
  • Kazuto Ogawa and Koji Nuida
  • Company privacy dashboards : employees needs and requirements
  • Svenja Polst, Patricia Kelbert, and Denis Feth
  • Privacy and power implications of web location of personal data authenticators
  • Kirsten E. Richards
  • Trust in automated software repair : the effects of repair source, transparency, and programmer experience on perceived trustworthiness and trust
  • Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose Gamble, Sarah A. Jessup, August Capiola, and Marc D. Pfahler
  • [IV].
  • Measuring network user trust via mouse behavior characteristics under different emotions
  • Biao Wang, Shiquan Xiong, Shuping Yi, Qian Yi, and Fangfei Yan
  • Privacy and trust:
  • Reciprocities or incentives? Understanding privacy intrusion perspectives and sharing behaviors
  • Ala Sarah Alaqra and Erik Wästlund
  • Trust in autonomous technologies : a contextual comparison of influencing user factors
  • Teresa Brell, Hannah Biermann, Ralf Philipsen, and Martina Ziefle
  • Privacy preserving system for real-time enriched integrated service with feedback to providers
  • Kaisei Kajita, Kazuto Ogawa, and Go Ohtake
Control code
on1111783780
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783030223519
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
(OCoLC)1111783780
Label
HCI for cybersecurity, privacy and trust : first International Conference, HCI-CPT 2019, held as part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, proceedings, Abbas Moallem (Ed.)
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Identity verification using face recognition for artificial-intelligence electronic forms with speech interaction
  • Akitoshi Okumura, Shuji Komeiji, Motohiko Sakaguchi, Masahiro Tabuchi, and Hiroaki Hattori
  • BREAKING : password entry is fine
  • Catlin Pidel and Stephan Neuhaus
  • Explore-a-nation : combining graphical and alphanumeric authentication
  • Lauren N. Tiller, Catherine A. Angelini, Sarah C. Leibner, and Jeremiah D. Still
  • [I].
  • Authentication:
  • Grid authentication : a memorability and user sentiment study
  • Paul Biocco and Mohd Anwar
  • Consonant-vowel-consonant for error-free code entry
  • Nikola K. Blanchard, Leila Gabasova, and Ted Selker
  • Two-factor authentication using leap motion and numeric keypad
  • Tomoki Manabe and Hayato Yamana
  • Social preferences in decision making under cybersecurity risks and uncertainties
  • Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, and Christopher Frantz
  • Understanding perceptions : user responses to browser warning messages
  • Heather Molyneaux, Irina Kondratova, and Elizabeth Stobert
  • Understanding parents' concerns with smart device usage in the home
  • Aarathi Prasad, Ruben Ruiz, and Timothy Stablein
  • Gamification techniques for raising cyber security awareness
  • Sam Scholefield and Lynsay A. Shepherd
  • An identification method of untrusted interactive behavior in ERP system based on Markov chain
  • Mengyao Xu, Qian Yi, Shuping Yi, and Shiquan Xiong
  • [II].
  • Cybersecurity awareness and behavior:
  • From cyber-security deception to manipulation and gratification through gamification
  • Xavier Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, and Robert Atkinson
  • Gamifying security awareness : a new prototype
  • John Russell Cole, Toni Pence, Jeffrey Cummings, and Elizabeth Baker
  • Alertin users about phishing attacks
  • Giuseppe Desolda, Francesco Di Nocera, Lauren Ferro, Rosa Lanzilotti, Piero Maggi, and Andrea Marrella
  • Classification of web history tools through web analysis
  • João Rafael Gonçalves Evangelista, Dacyr Dante de Oliveira Gatto, and Renato José Sassi
  • Investigating visualisation techniques for rapid triage of digital forensic evidence
  • Gavin Hales and Ethan Bayne
  • Behind the façade : paradigms in ubiquitous cryptography
  • Aaron MacSween and Yann Flory
  • Interdependencies, conflicts and trade-offs between security and usability : why and how should we engineer them?
  • Bilal Naqvi and Ahmed Seffah
  • Informing hybrid system design in cyber security incident response
  • Megan Nyre-Yu, Kelly A. Sprehn, and Barrett S. Caldwell
  • [III].
  • Revolutionizing the visual design of capture the flag (CTF) competitions
  • Rukman Senanayake, Phillip Porras, and Jason Kaehler
  • Security and usability:
  • A framework of information security integrated with human factors
  • Ahmed I. Al-Darwish and Pilsung Choe
  • Making sense of Darknet markets : automatic inference of emantic classifications from unconventional multimedia datasets
  • Alexander Berman and Celeste Lyn Paul
  • Policy creation for enterprise-level data sharing
  • Linda Briesemeister, Woodrow Gustafson, Grit Denker, April Martin, Karsten Martiny, Ron Moore, Dusko Pavlovic, and Mark St. John
  • The automatic detection of sensitive data in smart homes
  • Mahsa Keshavarz and Mohd Anwar
  • Privacy preservation for versatile pay-TV services
  • Kazuto Ogawa and Koji Nuida
  • Company privacy dashboards : employees needs and requirements
  • Svenja Polst, Patricia Kelbert, and Denis Feth
  • Privacy and power implications of web location of personal data authenticators
  • Kirsten E. Richards
  • Trust in automated software repair : the effects of repair source, transparency, and programmer experience on perceived trustworthiness and trust
  • Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose Gamble, Sarah A. Jessup, August Capiola, and Marc D. Pfahler
  • [IV].
  • Measuring network user trust via mouse behavior characteristics under different emotions
  • Biao Wang, Shiquan Xiong, Shuping Yi, Qian Yi, and Fangfei Yan
  • Privacy and trust:
  • Reciprocities or incentives? Understanding privacy intrusion perspectives and sharing behaviors
  • Ala Sarah Alaqra and Erik Wästlund
  • Trust in autonomous technologies : a contextual comparison of influencing user factors
  • Teresa Brell, Hannah Biermann, Ralf Philipsen, and Martina Ziefle
  • Privacy preserving system for real-time enriched integrated service with feedback to providers
  • Kaisei Kajita, Kazuto Ogawa, and Go Ohtake
Control code
on1111783780
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783030223519
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Specific material designation
remote
System control number
(OCoLC)1111783780

Library Locations

Processing Feedback ...