


default search action
16th HCI 2014: Heraklion, Crete, Greece
- Theo Tryfonas

, Ioannis G. Askoxylakis:
Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Lecture Notes in Computer Science 8533, Springer 2014, ISBN 978-3-319-07619-5
Usable Security
- Marios Belk, Christos Fidas

, Panagiotis Germanakos, George Samaras:
On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security. 3-10 - Panos Chatziadam, Ioannis G. Askoxylakis, Alexandros G. Fragkiadakis

:
A Network Telescope for Early Warning Intrusion Detection. 11-22 - John Haggerty, Thomas Hughes-Roberts:

Visualization of System Log Files for Post-incident Analysis and Response. 23-32 - Yasser M. Hausawi, William H. Allen

:
An Assessment Framework for Usable-Security Based on Decision Science. 33-44 - Michael Huth, Jim Huan-Pu Kuo:

On Designing Usable Policy Languages for Declarative Trust Aggregation. 45-56 - Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki

:
An Image-Based CAPTCHA Using Sophisticated Mental Rotation. 57-68 - Iacovos Kirlappos, Martina Angela Sasse:

What Usable Security Really Means: Trusting and Engaging Users. 69-78 - Katharina Krombholz, Peter Frühwirt, Peter Kieseberg

, Ioannis Kapsalis, Markus Huber, Edgar R. Weippl:
QR Code Security: A Survey of Attacks and Challenges for Usable Security. 79-90 - Rutuja More, Abhishek Bora:

Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India. 91-101 - Paschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis:

Discrete Hardware Apparatus and Method for Mobile Application and Communication Security. 102-112
Authentication and Passwords
- Panagiotis Andriotis

, Theo Tryfonas
, George C. Oikonomou
:
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method. 115-126 - Yee-Yin Choong:

A Cognitive-Behavioral Framework of User Password Management Lifecycle. 127-137 - Soumyadeb Chowdhury

, Ron Poet, Lewis Mackenzie:
Do Graphical Authentication Systems Solve the Password Memorability Problem? 138-148 - Stefanie Falkner, Peter Kieseberg

, Dimitris E. Simos, Christina Traxler, Edgar R. Weippl:
E-voting Authentication with QR-codes. 149-159 - Kristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee:

I Can't Type That! P@$$w0rd Entry on Mobile Devices. 160-171 - Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt:

Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention. 172-182 - Karen Renaud

, Melanie Volkamer, Joseph Maguire
:
ACCESS: Describing and Contrasting - Authentication Mechanisms. 183-194 - Brian C. Stanton, Kristen K. Greene:

Character Strings, Memory and Passwords: What a Recall Study Can Tell Us. 195-206
Security Policy and Awareness
- Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller:

From Regulations to Practice: Achieving Information Security Compliance in Healthcare. 209-220 - Raja Naeem Akram, Konstantinos Markantonakis

:
Rethinking the Smart Card Technology. 221-232 - Tristan Caulfield

, David J. Pym, Julian Williams:
Compositional Security Modelling - Structure, Economics, and Behaviour. 233-245 - Fredrik Karlsson

, Karin Hedström
:
End User Development and Information Security Culture. 246-257 - Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis:

DSAPE - Dynamic Security Awareness Program Evaluation. 258-269 - Jason R. C. Nurse, Philip A. Legg

, Oliver Buckley, Ioannis Agrafiotis, Gordon R. T. Wright, Monica T. Whitty
, David Upton, Michael Goldsmith, Sadie Creese:
A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches. 270-281 - Giles Oatley

, Tom Crick
:
Changing Faces: Identifying Complex Behavioural Profiles. 282-293
Human Behaviour in Cybersecurity
- Reza Alavi, Shareeful Islam, Haralambos Mouratidis

:
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations. 297-305 - Ana Ferreira

, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
Socio-technical Security Analysis of Wireless Hotspots. 306-317 - Ana Ferreira

, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
A Conceptual Framework to Study Socio-Technical Security. 318-329 - Fudong Li, Ross Wheeler, Nathan L. Clarke

:
An Evaluation of Behavioural Profiling on Mobile Devices. 330-339 - Charles Morisset, Thomas Groß

, Aad P. A. van Moorsel, Iryna Yevseyeva:
Nudging for Quantitative Access Control Systems. 340-351 - Mariam Nouh

, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior. 352-360 - Karen Renaud, Wendy Goucher:

The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture. 361-372
Privacy Issues
- Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis C. Stamatiou

:
User Acceptance of Privacy-ABCs: An Exploratory Study. 375-386 - Francine Bülow Bergmann, Milene Selbach Silveira:

"My Life Doesn't Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites. 387-399 - Jurlind Budurushi

, Simon Stockhardt, Marcel Woide, Melanie Volkamer:
Paper Audit Trails and Voters' Privacy Concerns. 400-409 - Kovila P. L. Coopamootoo, Thomas Groß:

Mental Models for Usable Privacy: A Position Paper. 410-421 - Anna L. Langhorne:

Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users? 422-432 - Arunee Ratikan, Mikifumi Shikida:

Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks. 433-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














