Human Aspects of Information Security, Privacy, and Trust: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings
This book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies.
Ce spun oamenii - Scrieți o recenzie
Nu am găsit nicio recenzie în locurile obișnuite.
Alte ediții - Afișați-le pe toate
activities analysis Android anonymity application approach Askoxylakis Eds assessment attack authentication automated BACnet ballot CAPTCHA complex component context cyber developed effects election emails employees encryption evaluation exercise experience Facebook factors forensic framework graph human Human-Computer Interaction identified IEEE implemented information security infrastructure insider threat interaction interface International Conference International Publishing Switzerland Internet investigation ISA programs LNCS malware mental models messages method methodology mobile devices paper participants password policies permissions phishing poll workers potential presented principles privacy and security protection Publishing Switzerland 2015 questions requirements scenario security behavior security culture security risk self-efficacy smart smart building smartphone social media social networking specific Springer International Publishing temporal tool trust Tryfonas usability usable-security user’s users variables visual voters voting systems vulnerabilities Wi-Fi XACML