標題: Titlebook: HCI for Cybersecurity, Privacy and Trust; 5th International Co Abbas Moallem Conference proceedings 2023 The Editor(s) (if applicable) and [打印本頁] 作者: 力學(xué) 時間: 2025-3-21 16:52
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋學(xué)科排名
作者: 歡騰 時間: 2025-3-21 23:51 作者: 反對 時間: 2025-3-22 02:13
HCI for Cybersecurity, Privacy and Trust978-3-031-35822-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 進入 時間: 2025-3-22 08:03 作者: 不知疲倦 時間: 2025-3-22 11:13 作者: Phagocytes 時間: 2025-3-22 15:46
The Atlantic Imperial Constitutionaintenance is required for computer and network security; 2) Physical safety protection to avoid safety accidents caused by environmental factors; 3) Establish a complete monitoring and automatic response mechanism; 4) Enterprise data disaster tolerance measures can systematically ensure security.作者: insincerity 時間: 2025-3-22 19:43
The Emergence of Quasi-Geostrophic Theory*es of data guardians can aid organizations in recognizing and supporting this critical role. Study insights can also help designers of systems that process personal data to better align with the needs and constraints of data guardians.作者: 色情 時間: 2025-3-23 00:29 作者: orient 時間: 2025-3-23 01:35
Research on the Capability Maturity Model of Data Security in the Era of Digital Transformationaintenance is required for computer and network security; 2) Physical safety protection to avoid safety accidents caused by environmental factors; 3) Establish a complete monitoring and automatic response mechanism; 4) Enterprise data disaster tolerance measures can systematically ensure security.作者: GUMP 時間: 2025-3-23 06:56
Data Guardians’ Behaviors and?Challenges While Caring for?Others’ Personal Dataes of data guardians can aid organizations in recognizing and supporting this critical role. Study insights can also help designers of systems that process personal data to better align with the needs and constraints of data guardians.作者: cardiovascular 時間: 2025-3-23 13:30
Conference proceedings 2023 Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark.. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings fo作者: foppish 時間: 2025-3-23 15:07 作者: Narcissist 時間: 2025-3-23 20:19 作者: defendant 時間: 2025-3-24 00:57 作者: Senescent 時間: 2025-3-24 05:35
(I Can’t Get No) Satisfaction: On the?Existence of?Satisfaction as?a?Component of?Usable Security anbeen done, most of them have mainly evaluated the effectiveness and efficiency of the proposed methods, and there is a possibility that satisfaction or comfort has not been sufficiently evaluated. Therefore, this paper investigates how satisfaction or comfort is evaluated in usable security research and discusses the results.作者: obstruct 時間: 2025-3-24 06:53 作者: 山羊 時間: 2025-3-24 14:32
0302-9743 t, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark.. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proc作者: 形容詞詞尾 時間: 2025-3-24 18:06
The Atmospheric Chemist’s Companionsonalised software services by allowing end-users to retain an optimal degree of control over their personal data (such as voice and video recordings) which is typically collected by the service provider and stored on the service provider’s cloud platform.作者: CREEK 時間: 2025-3-24 20:32
Transparency of?Privacy Risks Using PIA Visualizationsrovided about risk reductions and the type of risks, the visualization and usability of the PIA UIs require future development. Specifically, it should be tailored to the target group’s mental models and background knowledge.作者: headlong 時間: 2025-3-25 02:46 作者: CLASP 時間: 2025-3-25 04:55 作者: conference 時間: 2025-3-25 10:37
Refining the Understanding of Usable Securityusability of the technology being a factor that could clearly help or impede the acceptance and operation of security, and therefore impact the related culture). The study suggests that, to some degree, the cybersecurity community is catching up with notions that the HCI field has understood for lon作者: Abrade 時間: 2025-3-25 13:32 作者: crease 時間: 2025-3-25 16:38
Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH ccessed. Security infrastructure needs to be improved so that it is not easy to be hacked and it is necessary to establish guidelines, rules, and task forces that play a role in tackling information technology disasters or data leaks. The limitation of this research is that the data obtained is only作者: 興奮過度 時間: 2025-3-25 21:36
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental on scenarios for sharing and utilization of personal health data and visualization feedback to users. Various types of health data are collected and integrated into the system with decentralized data analysis while sharing results and models and reducing data transmission for privacy-preserving. The作者: 忘川河 時間: 2025-3-26 04:04 作者: ADOPT 時間: 2025-3-26 07:51 作者: Heart-Attack 時間: 2025-3-26 12:28 作者: 抱狗不敢前 時間: 2025-3-26 16:36 作者: 輕推 時間: 2025-3-26 17:51
0302-9743 and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies..978-3-031-35821-0978-3-031-35822-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Baffle 時間: 2025-3-27 00:01
Mojtaba Heydari,Fahimeh Marefatrovided about risk reductions and the type of risks, the visualization and usability of the PIA UIs require future development. Specifically, it should be tailored to the target group’s mental models and background knowledge.作者: 同步左右 時間: 2025-3-27 03:37
https://doi.org/10.1057/9780230582989ation and design experts. Three design choices worked for this target group: 1. Careful crafting of the language of the questions; 2. a flexible structure; and 3. a playful design. By combining these three elements into the GDPR Pitstop tool, GDPR awareness within the gaming industry can be improved作者: incredulity 時間: 2025-3-27 07:29 作者: 未開化 時間: 2025-3-27 09:32
https://doi.org/10.1007/978-94-011-7750-4usability of the technology being a factor that could clearly help or impede the acceptance and operation of security, and therefore impact the related culture). The study suggests that, to some degree, the cybersecurity community is catching up with notions that the HCI field has understood for lon作者: Processes 時間: 2025-3-27 17:18
H. Verwey-Jonker,P. O. M. Brackel to list the survey targets for each service or application and conduct the survey for each service or application. As a result of the survey, there were no services or apps that were confirmed to have implemented inappropriate storage methods in both the top sites in the Alexa ranking and the top a作者: Exposure 時間: 2025-3-27 19:21 作者: 鋼筆記下懲罰 時間: 2025-3-28 00:57 作者: 金桌活畫面 時間: 2025-3-28 05:27
https://doi.org/10.1007/978-3-030-55322-7f-determination measures (e.g., end-to-end consent management), these needs, abilities and some fundamental limitations must be considered. With this paper, we discuss how ecosystem providers and participants can implement data sovereignty in a user-friendly way. We extend the human-centred design p作者: 逗留 時間: 2025-3-28 07:55
Trygve Hesthagen,Odd Terje Sandlund questions in natural language. Instead of blindly accepting a privacy policy, a user could first query the system for answers to a potential concern. The system will return a ranked list of phrases and documents matching the query. In case the generated answer is not sufficient for the user, an ext作者: Fibroid 時間: 2025-3-28 12:30 作者: 貴族 時間: 2025-3-28 16:25 作者: 宿醉 時間: 2025-3-28 21:50 作者: Halfhearted 時間: 2025-3-28 22:56
Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Childly, to how parents are involved in their children’s password practices. To better understand both the password practices of parents, as well as how parents are involved in their children’s password practices, we conducted a survey study of 265 parents in the United States (US) with school-aged child作者: BATE 時間: 2025-3-29 04:40 作者: Venules 時間: 2025-3-29 08:59
Survey of?Services that?Store Passwords in?a?Recoverable Mannerthem to decipher in case of unauthorized intrusion from the outside. As a typical example, passwords are converted into hash values using the SHA2 algorithm and stored. However, not all web services and applications implement the ideal storage method. There have been many incidents in which personal作者: ornithology 時間: 2025-3-29 12:35
(I Can’t Get No) Satisfaction: On the?Existence of?Satisfaction as?a?Component of?Usable Security anor his work on usability in web and UI design, defines satisfaction as one of the five qualitative elements in usability. Whitten and Tygar’s paper, one of the earliest usability studies on usable security, also includes “sufficiently comfortable” as one of the usability definitions for security, wh作者: 裝飾 時間: 2025-3-29 16:02
Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH System) application. This research uses qualitative methods by analyzing online news media. The news is collected using the NCapture feature and then the Nvivo 12 plus software is used to manage and analyze the data. The results show that the accurate indicator in the SIDALIH application service has作者: 努力趕上 時間: 2025-3-29 22:47 作者: 浪費時間 時間: 2025-3-30 02:25
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental h data involves sensitive information, it is necessary to require a secure way to manage and use data with the consent of each individual. To integrate and share health data securely, many frameworks using federated learning and blockchain-based system have been proposed. However, the issues of ensu作者: 流浪者 時間: 2025-3-30 04:29 作者: Inveterate 時間: 2025-3-30 10:20
Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation academic research and industrial circles. This paper aims to develop an enterprise data security capability maturity model in the era of digital transformation. Firstly, systematic literature review (SLR) was used to build up the hierarchical model of enterprise data security, which consists of thr作者: 強所 時間: 2025-3-30 12:28
Data Guardians’ Behaviors and?Challenges While Caring for?Others’ Personal Data necessary that workers who interact with personal data understand and practice good security and privacy habits. However, to date, there has been little examination of perceptions, behaviors, and challenges among these professionals. To address this gap, we conducted an interview study of 19 indivi作者: forthy 時間: 2025-3-30 17:59
A Privacy-Orientated Distributed Data Storage Model for Smart Homessed for. This paper proposes a way to reduce the level of dis-trust between the end-users and the companies that offer smart home hard-ware and/or personalised software services by allowing end-users to retain an optimal degree of control over their personal data (such as voice and video recordings)作者: 政府 時間: 2025-3-31 00:19 作者: Vital-Signs 時間: 2025-3-31 01:39 作者: ENNUI 時間: 2025-3-31 05:14
Multi-ledger Coordinating Mechanism by Smart Contract for Individual-Initiated Trustworthy Data Sharst concerns about the storage and use of sensitive personal health data is privacy. To address this issue, we propose a new Multi-Ledger Coordinating Mechanism (MLCM) with blockchain for trustworthy data sharing under the control of each individual data owner. MLCM, enabled by smart contracts, lets 作者: 最高峰 時間: 2025-3-31 11:12
Mojtaba Heydari,Fahimeh Marefato all types of end users. Privacy Impact Assessments (PIAs) is a standardized tool that identifies and assesses privacy risks associated with the use of a system. In this work, we used the results of the PIA conducted in our use case to visualize privacy risks to end users in the form of User Interf作者: cunning 時間: 2025-3-31 16:21
https://doi.org/10.1057/9780230582989rotection Regulation (GDPR), especially when designing in a private sensitive way. Inadequate understanding of how to apply the GDPR in the game development process can lead to one of two consequences: 1. inadvertently violating the GDPR with sizeable fines as potential penalties; or 2. avoiding the作者: 東西 時間: 2025-3-31 20:57
Reid Cramer,Trina R. Williams Shanksly, to how parents are involved in their children’s password practices. To better understand both the password practices of parents, as well as how parents are involved in their children’s password practices, we conducted a survey study of 265 parents in the United States (US) with school-aged child作者: 諷刺滑稽戲劇 時間: 2025-3-31 22:50
https://doi.org/10.1007/978-94-011-7750-4 of usable security, but few can precisely define it in practice and in terms of how it influences users’ security behaviour and the wider security culture in organisations. This paper investigates how different sources characterise usability and usable security to identify the key aspects that affe作者: finite 時間: 2025-4-1 04:20
H. Verwey-Jonker,P. O. M. Brackelthem to decipher in case of unauthorized intrusion from the outside. As a typical example, passwords are converted into hash values using the SHA2 algorithm and stored. However, not all web services and applications implement the ideal storage method. There have been many incidents in which personal作者: 中和 時間: 2025-4-1 07:44 作者: Certainty 時間: 2025-4-1 11:57 作者: 摘要記錄 時間: 2025-4-1 17:21
Charles T. Bourland,Gregory L. Vogtare popular due to mass availability and ease of access. Installing such applications can lead to malware infection, including viruses and ransomware. Therefore, we explored the design of interventions to prevent the users from installing applications from unknown publishers. To this end, we conduct作者: 我們的面粉 時間: 2025-4-1 20:59 作者: Culmination 時間: 2025-4-2 00:14