| TÃtulo : |
Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Moallem, Abbas, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIX, 490 p. 97 ilustraciones, 67 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-77392-2 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Seguridad de datos e información Red informática Redes de comunicación informática CriptologÃa Aplicaciones informáticas y de sistemas de información Interfaces de usuario e interacción persona-computadora Cifrado de datos (Informática) Criptografà |
| Ãndice Dewey: |
5.437 |
| Resumen: |
Este libro constituye las actas arbitradas de la Tercera Conferencia Internacional sobre HCI para Ciberseguridad, Privacidad y Confianza, HCI-CPT 2021, celebrada como parte de la 23ª Conferencia Internacional, HCI International 2021, que tuvo lugar virtualmente en julio de 2021. El total de 1276 Los artÃculos y 241 carteles incluidos en los 39 volúmenes de actas del HCII 2021 se revisaron y seleccionaron cuidadosamente entre 5222 presentaciones. HCI-CPT 2021 incluye un total de 30 artÃculos; estaban organizados en secciones temáticas denominadas: seguridad utilizable; seguridad y privacidad por diseño; análisis del comportamiento de los usuarios en ciberseguridad; y concienciación sobre seguridad y privacidad. |
| Nota de contenido: |
Usable Security -- Authentication Management of Home IoT Devices -- Emics and Etics of Usable Security: Culturally Specific or Culturally Universal? -- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks -- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review -- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes -- Risk Assessment of "Ostrich ZIP" -- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users -- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services -- Security and Privacy by Design -- Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience -- A Human Factor Approach to Threat Modeling -- Smart Technologies and Internet of Things Designed for Aging in Place -- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration -- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces -- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk -- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior -- Privacy Design Strategies and the GDPR: A Systematic Literature Review -- User Behavior Analysis in Cybersecurity -- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure -- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices -- Perceptions of Security and Privacy in mHealth -- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account -- CyberPin - Challenges on Recognizing Youngest Cyber Talents -- It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness -- Understanding the Last Line of Defense: Human Response to Cybersecurity Events -- Security and Privacy Awareness -- The Effectiveness of Video Messaging Campaigns to Use 2FA -- A Study on Online Businesses' Commitment to Consumer Privacy -- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks -- Social Engineering Attacks: Recent Advances and Challenges -- Brand Validation: Security Indicator to Better Indicate Website Identity -- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials -- Gaming Apps' and Social Media Partnership: A Privacy Perspective. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings [documento electrónico] / Moallem, Abbas, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIX, 490 p. 97 ilustraciones, 67 ilustraciones en color. ISBN : 978-3-030-77392-2 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Seguridad de datos e información Red informática Redes de comunicación informática CriptologÃa Aplicaciones informáticas y de sistemas de información Interfaces de usuario e interacción persona-computadora Cifrado de datos (Informática) Criptografà |
| Ãndice Dewey: |
5.437 |
| Resumen: |
Este libro constituye las actas arbitradas de la Tercera Conferencia Internacional sobre HCI para Ciberseguridad, Privacidad y Confianza, HCI-CPT 2021, celebrada como parte de la 23ª Conferencia Internacional, HCI International 2021, que tuvo lugar virtualmente en julio de 2021. El total de 1276 Los artÃculos y 241 carteles incluidos en los 39 volúmenes de actas del HCII 2021 se revisaron y seleccionaron cuidadosamente entre 5222 presentaciones. HCI-CPT 2021 incluye un total de 30 artÃculos; estaban organizados en secciones temáticas denominadas: seguridad utilizable; seguridad y privacidad por diseño; análisis del comportamiento de los usuarios en ciberseguridad; y concienciación sobre seguridad y privacidad. |
| Nota de contenido: |
Usable Security -- Authentication Management of Home IoT Devices -- Emics and Etics of Usable Security: Culturally Specific or Culturally Universal? -- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks -- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review -- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes -- Risk Assessment of "Ostrich ZIP" -- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users -- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services -- Security and Privacy by Design -- Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience -- A Human Factor Approach to Threat Modeling -- Smart Technologies and Internet of Things Designed for Aging in Place -- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration -- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces -- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk -- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior -- Privacy Design Strategies and the GDPR: A Systematic Literature Review -- User Behavior Analysis in Cybersecurity -- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure -- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices -- Perceptions of Security and Privacy in mHealth -- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account -- CyberPin - Challenges on Recognizing Youngest Cyber Talents -- It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness -- Understanding the Last Line of Defense: Human Response to Cybersecurity Events -- Security and Privacy Awareness -- The Effectiveness of Video Messaging Campaigns to Use 2FA -- A Study on Online Businesses' Commitment to Consumer Privacy -- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks -- Social Engineering Attacks: Recent Advances and Challenges -- Brand Validation: Security Indicator to Better Indicate Website Identity -- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials -- Gaming Apps' and Social Media Partnership: A Privacy Perspective. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |