| TÃtulo : |
First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Moallem, Abbas, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XIX, 484 p. 292 ilustraciones, 131 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-22351-9 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Aplicaciones informáticas y de sistemas de información Entornos informáticos CriptologÃa Servicios de seguridad Seguridad de datos e información Interfaces de usuario e interacción persona-computadora Application software Cifrado de datos (Informática) CriptografÃa Protección de datos La interacción persona-ordenador Interfaces de usuario (sistemas informáticos) Ordenador |
| Ãndice Dewey: |
5.437 |
| Resumen: |
Este libro constituye las actas minuciosamente arbitradas de la Primera Conferencia Internacional sobre HCI para la Ciberseguridad, la Privacidad y la Confianza, HCI-CPT 2019, que se celebró como parte de la 21.ª Conferencia Internacional de HCI, HCII 2019, en Orlando, FL, EE. UU., en julio. 2019. El total de 1275 artÃculos y 209 carteles incluidos en los 35 volúmenes de actas de HCII 2019 fueron cuidadosamente revisados ​​y seleccionados entre 5029 presentaciones. HCI-CPT 2019 incluye un total de 32 artÃculos; se organizaron en secciones temáticas denominadas: Autenticación; conciencia y comportamiento en materia de ciberseguridad; seguridad y usabilidad; y privacidad y confianza. |
| Nota de contenido: |
Authentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- PrivacyPreserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings [documento electrónico] / Moallem, Abbas, . - 1 ed. . - [s.l.] : Springer, 2019 . - XIX, 484 p. 292 ilustraciones, 131 ilustraciones en color. ISBN : 978-3-030-22351-9 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Aplicaciones informáticas y de sistemas de información Entornos informáticos CriptologÃa Servicios de seguridad Seguridad de datos e información Interfaces de usuario e interacción persona-computadora Application software Cifrado de datos (Informática) CriptografÃa Protección de datos La interacción persona-ordenador Interfaces de usuario (sistemas informáticos) Ordenador |
| Ãndice Dewey: |
5.437 |
| Resumen: |
Este libro constituye las actas minuciosamente arbitradas de la Primera Conferencia Internacional sobre HCI para la Ciberseguridad, la Privacidad y la Confianza, HCI-CPT 2019, que se celebró como parte de la 21.ª Conferencia Internacional de HCI, HCII 2019, en Orlando, FL, EE. UU., en julio. 2019. El total de 1275 artÃculos y 209 carteles incluidos en los 35 volúmenes de actas de HCII 2019 fueron cuidadosamente revisados ​​y seleccionados entre 5029 presentaciones. HCI-CPT 2019 incluye un total de 32 artÃculos; se organizaron en secciones temáticas denominadas: Autenticación; conciencia y comportamiento en materia de ciberseguridad; seguridad y usabilidad; y privacidad y confianza. |
| Nota de contenido: |
Authentication -- Grid Authentication: A Memorability and User Sentiment Study -- Consonant-Vowel-Consonants for Error-Free Code Entry -- Two-Factor Authentication using Leap Motion and Numeric Keypad -- Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction -- BREAKING: Password Entry is Fine -- Explore-a-Nation: Combining Graphical and Alphanumeric Authentication -- Cybersecurity Awareness and Behavior -- From Cyber-Security Deception To Manipulation and Gratification Through Gamification -- Gamifying Security Awareness: A New Prototype -- Alerting Users about Phishing Attacks -- Social Preferences in Decision Making under Cybersecurity Risks and Uncertainties -- Understanding Perceptions: User Responses to Browser Warning Messages -- Understanding Parents' Concerns with Smart Device Usage in the Home -- Gamification Techniques for Raising Cyber Security Awareness -- An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain -- Security and Usability -- A Framework of Information Security Integrated with Human Factors -- Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets -- Policy Creation for Enterprise-Level Data Sharing -- Classification of Web History Tools Through Web Analysis -- Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence -- Behind the façade: Paradigms of Ubiquitous Cryptography -- Interdependencies, Conflicts and Trade-offs between Security and Usability: Why and how should we Engineer Them? -- Informing Hybrid System Design in Cyber Security Incident Response -- Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions -- Privacy and Trust -- Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors -- Trust in Autonomous Technologies - A contextual comparison of influencing user factors -- PrivacyPreserving System for Real-time Enriched-Integrated Service with Feedback to Providers -- The Automatic Detection of Sensitive Data in Smart Homes -- Privacy Preservation for Versatile Pay-TV Services -- Company Privacy Dashboards: Employee Needs and Requirements -- Privacy and Power Implications of Web Location of Personal Data Authenticators -- Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust -- Measuring network user trust via mouse behavior characteristics under different emotions. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |