default search action
HCI 2019: Orlando, FL, USA
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings. Lecture Notes in Computer Science 11594, Springer 2019, ISBN 978-3-030-22350-2
Authentication
- Paul Biocco, Mohd Anwar:
Grid Authentication: A Memorability and User Sentiment Study. 3-18 - Nikola K. Blanchard, Leila Gabasova, Ted Selker:
Consonant-Vowel-Consonants for Error-Free Code Entry. 19-37 - Tomoki Manabe, Hayato Yamana:
Two-Factor Authentication Using Leap Motion and Numeric Keypad. 38-51 - Akitoshi Okumura, Shuji Komeiji, Motohiko Sakaguchi, Masahiro Tabuchi, Hiroaki Hattori:
Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speech Interaction. 52-66 - Catlin Pidel, Stephan Neuhaus:
BREAKING: Password Entry Is Fine. 67-80 - Lauren N. Tiller, Catherine A. Angelini, Sarah C. Leibner, Jeremiah D. Still:
Explore-a-Nation: Combining Graphical and Alphanumeric Authentication. 81-95
Cybersecurity Awareness and Behavior
- Xavier J. A. Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, Robert C. Atkinson:
From Cyber-Security Deception to Manipulation and Gratification Through Gamification. 99-114 - John Russell Cole, Toni B. Pence, Jeffrey Cummings, Elizabeth Baker:
Gamifying Security Awareness: A New Prototype. 115-133 - Giuseppe Desolda, Francesco Di Nocera, Lauren S. Ferro, Rosa Lanzilotti, Piero Maggi, Andrea Marrella:
Alerting Users About Phishing Attacks. 134-148 - Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, Christopher Frantz:
Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties. 149-163 - Heather Molyneaux, Irina Kondratova, Elizabeth Stobert:
Understanding Perceptions: User Responses to Browser Warning Messages. 164-175 - Aarathi Prasad, Rubén Ruiz, Timothy Stablein:
Understanding Parents' Concerns with Smart Device Usage in the Home. 176-190 - Sam Scholefield, Lynsay A. Shepherd:
Gamification Techniques for Raising Cyber Security Awareness. 191-203 - Mengyao Xu, Qian Yi, Shuping Yi, Shiquan Xiong:
An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chain. 204-214
Security and Usability
- Ahmed I. Al-Darwish, Pilsung Choe:
A Framework of Information Security Integrated with Human Factors. 217-229 - Alexander Berman, Celeste Lyn Paul:
Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional Multimedia Datasets. 230-248 - Linda Briesemeister, Woodrow Gustafson, Grit Denker, April Martin, Karsten Martiny, Ron Moore, Dusko Pavlovic, Mark F. St. John:
Policy Creation for Enterprise-Level Data Sharing. 249-265 - João Rafael Gonçalves Evangelista, Dacyr Dante de Oliveira Gatto, Renato José Sassi:
Classification of Web History Tools Through Web Analysis. 266-276 - Gavin Hales, Ethan Bayne:
Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence. 277-293 - Aaron MacSween, Yann Flory:
Behind the Façade - Paradigms in Ubiquitous Cryptography. 294-313 - Bilal Naqvi, Ahmed Seffah:
Interdependencies, Conflicts and Trade-Offs Between Security and Usability: Why and How Should We Engineer Them? 314-324 - Megan Nyre-Yu, Kelly A. Sprehn, Barrett S. Caldwell:
Informing Hybrid System Design in Cyber Security Incident Response. 325-338 - Rukman Senanayake, Phillip A. Porras, Jason Kaehler:
Revolutionizing the Visual Design of Capture the Flag (CTF) Competitions. 339-352
Privacy and Trust
- Ala Sarah Alaqra, Erik Wästlund:
Reciprocities or Incentives? Understanding Privacy Intrusion Perspectives and Sharing Behaviors. 355-370 - Teresa Brell, Hannah Biermann, Ralf Philipsen, Martina Ziefle:
Trust in Autonomous Technologies - A Contextual Comparison of Influencing User Factors. 371-384 - Kaisei Kajita, Kazuto Ogawa, Go Ohtake:
Privacy Preserving System for Real-Time Enriched-Integrated Service with Feedback to Providers. 385-403 - Mahsa Keshavarz, Mohd Anwar:
The Automatic Detection of Sensitive Data in Smart Homes. 404-416 - Kazuto Ogawa, Koji Nuida:
Privacy Preservation for Versatile Pay-TV Services. 417-428 - Svenja Polst, Patricia Kelbert, Denis Feth:
Company Privacy Dashboards: Employee Needs and Requirements. 429-440 - Kirsten E. Richards:
Privacy and Power Implications of Web Location of Personal Data Authenticators. 441-451 - Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose F. Gamble, Sarah A. Jessup, August A. Capiola, Marc D. Pfahler:
Trust in Automated Software Repair - The Effects of Repair Source, Transparency, and Programmer Experience on Perceived Trustworthiness and Trust. 452-470 - Biao Wang, Shiquan Xiong, Shuping Yi, Qian Yi, Fangfei Yan:
Measuring Network User Trust via Mouse Behavior Characteristics Under Different Emotions. 471-481
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.