標(biāo)題: Titlebook: HCI for Cybersecurity, Privacy and Trust; 6th International Co Abbas Moallem Conference proceedings 2024 The Editor(s) (if applicable) and [打印本頁(yè)] 作者: 深謀遠(yuǎn)慮 時(shí)間: 2025-3-21 18:40
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋學(xué)科排名
作者: BOAST 時(shí)間: 2025-3-21 22:30
Biomechanics of Total Disc Replacement,nt situation for the devices’ facilities in practice for disabled users. It then moves on to assess the user experience issues by assessing the accessibility and usability through a series of security seniors. While usability and accessibility features are certainly not new, the specific case of sec作者: 抱狗不敢前 時(shí)間: 2025-3-22 03:33
Charles A. Hallett,Elaine S. Hallettity activities after exposure to the training. We echo others in the literature by claiming the need for a paradigm shift in how traditional cybersecurity training is taught and how success is measured.作者: anachronistic 時(shí)間: 2025-3-22 05:47 作者: 易碎 時(shí)間: 2025-3-22 10:40 作者: 匯總 時(shí)間: 2025-3-22 13:24
https://doi.org/10.1057/9780230375550 and underlying barriers to practicing cyber resilience. A regression model shows that a lack of knowledge, skills, environmental context and resources, and protection motivation intention appear to be the strongest barriers to practicing cyber resilience, closely followed by perceived response effi作者: Density 時(shí)間: 2025-3-22 19:05
South Korea after the Developmental State,erges as a critical challenge, leading to cybersecurity risks such as data leakage, and inadvertent sharing of patient information. Technological solutions like mobile device management (MDM) and virtualisation, though employed to enhance control, face resistance due to concerns about privacy invasi作者: 敲竹杠 時(shí)間: 2025-3-22 23:41
https://doi.org/10.1007/978-981-19-1328-0ctors, which is administered by the Commissioner of the Department of Personal Data Protection and only applies to the private sector. Indonesia and Malaysia have also implemented various laws regulating personal data protection in addition to the PDPA. PDPA Indonesia regulates personal data protect作者: neolith 時(shí)間: 2025-3-23 03:07 作者: Ablation 時(shí)間: 2025-3-23 06:16 作者: Saline 時(shí)間: 2025-3-23 10:50
The Aspiring Entrepreneurship Scholarance rate of policies. Furthermore, we identified that the participants have incorrect expectations of the law; they expect the law to provide more stringent data protection than the protection it actually provides. Based on our findings, we recommend that researchers and service providers should ma作者: 無(wú)瑕疵 時(shí)間: 2025-3-23 14:57 作者: 并入 時(shí)間: 2025-3-23 21:20 作者: 薄膜 時(shí)間: 2025-3-23 23:49 作者: innovation 時(shí)間: 2025-3-24 05:21 作者: somnambulism 時(shí)間: 2025-3-24 09:40
“I’m not planning on?dying anytime soon!”: A Survey of?Digital Legacy Planning reported navigating uncertainty in handling the leaver’s data due to the lack of clear instructions or social norms. We suggest further research to develop tools that can assist users in creating and managing their digital legacies effectively, as well as integrating awareness of this subject into 作者: 友好 時(shí)間: 2025-3-24 11:41
To Bot or?Not to?Bot?: Analysing Mental Health Data Disclosuresparable to completing forms online which are sent from a mental health service provider, or requested through social media. Participants (n?=?236; female?=?58%, non-binary?=?5%, Prefer not to say?=?1%, age 18–80+yrs) were recruited from a UK mental health service provider and through social media..O作者: Palate 時(shí)間: 2025-3-24 16:47 作者: Sleep-Paralysis 時(shí)間: 2025-3-24 21:26
BYOD Security Practices in Australian Hospitals – A Qualitative Studyerges as a critical challenge, leading to cybersecurity risks such as data leakage, and inadvertent sharing of patient information. Technological solutions like mobile device management (MDM) and virtualisation, though employed to enhance control, face resistance due to concerns about privacy invasi作者: 胎兒 時(shí)間: 2025-3-25 01:09 作者: famine 時(shí)間: 2025-3-25 03:49 作者: 激怒某人 時(shí)間: 2025-3-25 09:53 作者: 切碎 時(shí)間: 2025-3-25 15:44
Japanese Users’ (Mis)understandings of?Technical Terms Used in?Privacy Policies and?the?Privacy Protance rate of policies. Furthermore, we identified that the participants have incorrect expectations of the law; they expect the law to provide more stringent data protection than the protection it actually provides. Based on our findings, we recommend that researchers and service providers should ma作者: projectile 時(shí)間: 2025-3-25 18:29 作者: chapel 時(shí)間: 2025-3-25 22:03
Conference proceedings 2024f the HCII 2024 proceedings are dedicated to this year’s edition of the HCI-CPT Conference. The first focuses on topics related to Cyber Hygiene, User Behavior and Security Awareness, and User Privacy and Security Acceptance. The second focuses on topics related to Cybersecurity Education and Training, and Threat Assessment and Protection..作者: 熟練 時(shí)間: 2025-3-26 03:31 作者: SOB 時(shí)間: 2025-3-26 05:04
https://doi.org/10.1007/978-3-030-38171-4of relevance to end-users (e.g. password selection, phishing avoidance, and safe use of networks), and seeks to present learning content via short, interactive experiences. The resulting app is realized in prototype form, with associated practical evaluation suggesting positive findings in terms of user performance and feedback.作者: 伴隨而來(lái) 時(shí)間: 2025-3-26 10:51
Early Childhood Musical Development, right and proper to be assigned the responsibility for educating their children about cybersecurity. However, they generally did not possess up-to-date cybersecurity knowledge nor benefit from UK government-provided cyber-related advice. Hence, they are responsibilized but not empowered to educate their children about cybersecurity.作者: Mobile 時(shí)間: 2025-3-26 13:32 作者: ELUC 時(shí)間: 2025-3-26 20:47 作者: indecipherable 時(shí)間: 2025-3-26 23:58
Enhancing Cyber Hygiene and Literacy via Interactive Mini-gamesof relevance to end-users (e.g. password selection, phishing avoidance, and safe use of networks), and seeks to present learning content via short, interactive experiences. The resulting app is realized in prototype form, with associated practical evaluation suggesting positive findings in terms of user performance and feedback.作者: follicle 時(shí)間: 2025-3-27 04:31 作者: 有抱負(fù)者 時(shí)間: 2025-3-27 07:13
With or?Without U(sers): A Journey to?Integrate UX Activities in?Cybersecurityalthough introducing UX methods progressively did not uniformly improve UX literacy, it reduced barriers to UX integration and increased confidence in conducting UX activities. Further, it facilitated effective communication within a multidisciplinary team, fostering consensus on development priorities.作者: Popcorn 時(shí)間: 2025-3-27 12:24 作者: 污點(diǎn) 時(shí)間: 2025-3-27 17:23
0302-9743 t, held as Part of the 26th International Conference, HCI International 2024, which took place from June 29 - July 4, 2024 in Washington DC, USA...Two volumes of the HCII 2024 proceedings are dedicated to this year’s edition of the HCI-CPT Conference. The first focuses on topics related to Cyber Hyg作者: 透明 時(shí)間: 2025-3-27 21:13
0302-9743 iene, User Behavior and Security Awareness, and User Privacy and Security Acceptance. The second focuses on topics related to Cybersecurity Education and Training, and Threat Assessment and Protection..978-3-031-61378-4978-3-031-61379-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 挖掘 時(shí)間: 2025-3-27 21:57
in relation to security and related usage. The findings also revealed notable variations in users’ abilities to navigate and interpret related interfaces, with the potential consequence that related features are not located or are misinterpreted.作者: Omniscient 時(shí)間: 2025-3-28 04:20
Exploring User Understanding of Wireless Connectivity and Security on Smartphonesin relation to security and related usage. The findings also revealed notable variations in users’ abilities to navigate and interpret related interfaces, with the potential consequence that related features are not located or are misinterpreted.作者: Fresco 時(shí)間: 2025-3-28 08:15
Functional Anatomy of the Lumbar Spine,ridge this gap, we interviewed 30 Google personal account holders in Saudi Arabia about their privacy perceptions and behaviors regarding the activity data that Google saves about them. Our study focuses on Google’s Activity Controls, which enable users to control whether, and how, Google saves thei作者: Common-Migraine 時(shí)間: 2025-3-28 13:35 作者: 諄諄教誨 時(shí)間: 2025-3-28 17:15 作者: Aerophagia 時(shí)間: 2025-3-28 20:04 作者: 祖先 時(shí)間: 2025-3-29 02:48
The Arts and the Teaching of Historyer, the lack of social norms, design, and legal frameworks to prepare a digital legacy may challenge users and data inheritors. We conducted a survey to understand the experiences of users who have either prepared for their own digital legacy or inherited someone else’s digital legacy. We found that作者: 表示問(wèn) 時(shí)間: 2025-3-29 03:49
Early Childhood Musical Development,nd a portal to report cybercrimes. Responsibilization works best when citizens are empowered to act in accordance with their responsibilities. Now, consider that UK parents, as part of their parental role, are probably also responsibilized for educating their children about cybersecurity. The questi作者: 繁榮中國(guó) 時(shí)間: 2025-3-29 09:18
The Arts of Citizenship in African Citiesl mental health assessments are time and resource intensive. With increases in demand for mental health services and decreases in funding and staffing levels, this paper explores whether conversational agents can be sufficiently ‘trusted’ to collect the sensitive data disclosed in initial mental hea作者: 攤位 時(shí)間: 2025-3-29 12:21
accessories. However, such channels can also introduce security and privacy risks if not configured and used correctly, which can in turn depend upon the perceptions, capabilities and understanding of the users. This study examines the issue from the potential of iPhone users, a popular platform th作者: GET 時(shí)間: 2025-3-29 19:09 作者: 來(lái)這真柔軟 時(shí)間: 2025-3-29 21:26
South Korea after the Developmental State,nced by significant data security concerns. This study aims to address the gaps in existing research by offering a comprehensive qualitative exploration of BYOD security practices in hospitals. Seven in-depth semi-structured interviews were conducted among IT personnel overseeing cybersecurity in Au作者: CLAIM 時(shí)間: 2025-3-30 00:08 作者: 愛管閑事 時(shí)間: 2025-3-30 07:17 作者: fertilizer 時(shí)間: 2025-3-30 10:45
Large-scale atmospheric dynamicses, concerns, and social resources that form their health information seeking practices. However, this has mostly looked at OAs as consumers of information. Comparatively less is known about what is needed from possible tools that support OAs’ ability to seek, understand, exchange, and manage health作者: 眨眼 時(shí)間: 2025-3-30 16:25
https://doi.org/10.1007/978-981-13-0182-7our introduction of UX activities in a cybersecurity project focused on creating cyber range scenarios. Research objectives include assessing non-UX stakeholders’ UX literacy, examining the impact of user involvement on non-UX stakeholders’ UX literacy, and identifying barriers and opportunities for作者: 脫落 時(shí)間: 2025-3-30 19:10
Research and Future Perspectives,er 2017 to July 2021. While security was not a specific focus of the transformation, the transformation enabled the move to a single-sign-on authentication mechanism, which had substantial cybersecurity benefits. It facilitated investigations and substantially simplified both granting and revoking e作者: Progesterone 時(shí)間: 2025-3-30 21:41
The Aspiring Entrepreneurship Scholarhowever, there are some barriers that prevent users from giving “true” consent. The most serious barrier is users’ misunderstanding of the data processing procedures described in privacy policies. Tang et al. investigated the U.S. users’ misunderstandings of technical terms used in privacy policies.作者: 酷熱 時(shí)間: 2025-3-31 01:46 作者: 花束 時(shí)間: 2025-3-31 07:42 作者: diskitis 時(shí)間: 2025-3-31 11:56
Seek and Locate? Examining the Accessibility of Cybersecurity Featuresy is one of the significant requirements that many users expect when using digital technology, hence, issues of accessibility and usability are important when considering security. Disabled users need to be provided with the same level of security functionality in an accessible and usable manner. Th作者: HATCH 時(shí)間: 2025-3-31 16:07