派博傳思國際中心

標題: Titlebook: HCI for Cybersecurity, Privacy and Trust; 5th International Co Abbas Moallem Conference proceedings 2023 The Editor(s) (if applicable) and [打印本頁]

作者: 力學(xué)    時間: 2025-3-21 16:52
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)




書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度




書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次




書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust年度引用




書目名稱HCI for Cybersecurity, Privacy and Trust年度引用學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋




書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋學(xué)科排名





作者: 歡騰    時間: 2025-3-21 23:51

作者: 反對    時間: 2025-3-22 02:13
HCI for Cybersecurity, Privacy and Trust978-3-031-35822-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 進入    時間: 2025-3-22 08:03

作者: 不知疲倦    時間: 2025-3-22 11:13

作者: Phagocytes    時間: 2025-3-22 15:46
The Atlantic Imperial Constitutionaintenance is required for computer and network security; 2) Physical safety protection to avoid safety accidents caused by environmental factors; 3) Establish a complete monitoring and automatic response mechanism; 4) Enterprise data disaster tolerance measures can systematically ensure security.
作者: insincerity    時間: 2025-3-22 19:43
The Emergence of Quasi-Geostrophic Theory*es of data guardians can aid organizations in recognizing and supporting this critical role. Study insights can also help designers of systems that process personal data to better align with the needs and constraints of data guardians.
作者: 色情    時間: 2025-3-23 00:29

作者: orient    時間: 2025-3-23 01:35
Research on the Capability Maturity Model of Data Security in the Era of Digital Transformationaintenance is required for computer and network security; 2) Physical safety protection to avoid safety accidents caused by environmental factors; 3) Establish a complete monitoring and automatic response mechanism; 4) Enterprise data disaster tolerance measures can systematically ensure security.
作者: GUMP    時間: 2025-3-23 06:56
Data Guardians’ Behaviors and?Challenges While Caring for?Others’ Personal Dataes of data guardians can aid organizations in recognizing and supporting this critical role. Study insights can also help designers of systems that process personal data to better align with the needs and constraints of data guardians.
作者: cardiovascular    時間: 2025-3-23 13:30
Conference proceedings 2023 Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark.. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings fo
作者: foppish    時間: 2025-3-23 15:07

作者: Narcissist    時間: 2025-3-23 20:19

作者: defendant    時間: 2025-3-24 00:57

作者: Senescent    時間: 2025-3-24 05:35
(I Can’t Get No) Satisfaction: On the?Existence of?Satisfaction as?a?Component of?Usable Security anbeen done, most of them have mainly evaluated the effectiveness and efficiency of the proposed methods, and there is a possibility that satisfaction or comfort has not been sufficiently evaluated. Therefore, this paper investigates how satisfaction or comfort is evaluated in usable security research and discusses the results.
作者: obstruct    時間: 2025-3-24 06:53

作者: 山羊    時間: 2025-3-24 14:32
0302-9743 t, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark.. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proc
作者: 形容詞詞尾    時間: 2025-3-24 18:06
The Atmospheric Chemist’s Companionsonalised software services by allowing end-users to retain an optimal degree of control over their personal data (such as voice and video recordings) which is typically collected by the service provider and stored on the service provider’s cloud platform.
作者: CREEK    時間: 2025-3-24 20:32
Transparency of?Privacy Risks Using PIA Visualizationsrovided about risk reductions and the type of risks, the visualization and usability of the PIA UIs require future development. Specifically, it should be tailored to the target group’s mental models and background knowledge.
作者: headlong    時間: 2025-3-25 02:46

作者: CLASP    時間: 2025-3-25 04:55

作者: conference    時間: 2025-3-25 10:37
Refining the Understanding of Usable Securityusability of the technology being a factor that could clearly help or impede the acceptance and operation of security, and therefore impact the related culture). The study suggests that, to some degree, the cybersecurity community is catching up with notions that the HCI field has understood for lon
作者: Abrade    時間: 2025-3-25 13:32

作者: crease    時間: 2025-3-25 16:38
Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH ccessed. Security infrastructure needs to be improved so that it is not easy to be hacked and it is necessary to establish guidelines, rules, and task forces that play a role in tackling information technology disasters or data leaks. The limitation of this research is that the data obtained is only
作者: 興奮過度    時間: 2025-3-25 21:36
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental on scenarios for sharing and utilization of personal health data and visualization feedback to users. Various types of health data are collected and integrated into the system with decentralized data analysis while sharing results and models and reducing data transmission for privacy-preserving. The
作者: 忘川河    時間: 2025-3-26 04:04

作者: ADOPT    時間: 2025-3-26 07:51

作者: Heart-Attack    時間: 2025-3-26 12:28

作者: 抱狗不敢前    時間: 2025-3-26 16:36

作者: 輕推    時間: 2025-3-26 17:51
0302-9743 and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies..978-3-031-35821-0978-3-031-35822-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Baffle    時間: 2025-3-27 00:01
Mojtaba Heydari,Fahimeh Marefatrovided about risk reductions and the type of risks, the visualization and usability of the PIA UIs require future development. Specifically, it should be tailored to the target group’s mental models and background knowledge.
作者: 同步左右    時間: 2025-3-27 03:37
https://doi.org/10.1057/9780230582989ation and design experts. Three design choices worked for this target group: 1. Careful crafting of the language of the questions; 2. a flexible structure; and 3. a playful design. By combining these three elements into the GDPR Pitstop tool, GDPR awareness within the gaming industry can be improved
作者: incredulity    時間: 2025-3-27 07:29

作者: 未開化    時間: 2025-3-27 09:32
https://doi.org/10.1007/978-94-011-7750-4usability of the technology being a factor that could clearly help or impede the acceptance and operation of security, and therefore impact the related culture). The study suggests that, to some degree, the cybersecurity community is catching up with notions that the HCI field has understood for lon
作者: Processes    時間: 2025-3-27 17:18
H. Verwey-Jonker,P. O. M. Brackel to list the survey targets for each service or application and conduct the survey for each service or application. As a result of the survey, there were no services or apps that were confirmed to have implemented inappropriate storage methods in both the top sites in the Alexa ranking and the top a
作者: Exposure    時間: 2025-3-27 19:21

作者: 鋼筆記下懲罰    時間: 2025-3-28 00:57

作者: 金桌活畫面    時間: 2025-3-28 05:27
https://doi.org/10.1007/978-3-030-55322-7f-determination measures (e.g., end-to-end consent management), these needs, abilities and some fundamental limitations must be considered. With this paper, we discuss how ecosystem providers and participants can implement data sovereignty in a user-friendly way. We extend the human-centred design p
作者: 逗留    時間: 2025-3-28 07:55
Trygve Hesthagen,Odd Terje Sandlund questions in natural language. Instead of blindly accepting a privacy policy, a user could first query the system for answers to a potential concern. The system will return a ranked list of phrases and documents matching the query. In case the generated answer is not sufficient for the user, an ext
作者: Fibroid    時間: 2025-3-28 12:30

作者: 貴族    時間: 2025-3-28 16:25

作者: 宿醉    時間: 2025-3-28 21:50

作者: Halfhearted    時間: 2025-3-28 22:56
Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Childly, to how parents are involved in their children’s password practices. To better understand both the password practices of parents, as well as how parents are involved in their children’s password practices, we conducted a survey study of 265 parents in the United States (US) with school-aged child
作者: BATE    時間: 2025-3-29 04:40

作者: Venules    時間: 2025-3-29 08:59
Survey of?Services that?Store Passwords in?a?Recoverable Mannerthem to decipher in case of unauthorized intrusion from the outside. As a typical example, passwords are converted into hash values using the SHA2 algorithm and stored. However, not all web services and applications implement the ideal storage method. There have been many incidents in which personal
作者: ornithology    時間: 2025-3-29 12:35
(I Can’t Get No) Satisfaction: On the?Existence of?Satisfaction as?a?Component of?Usable Security anor his work on usability in web and UI design, defines satisfaction as one of the five qualitative elements in usability. Whitten and Tygar’s paper, one of the earliest usability studies on usable security, also includes “sufficiently comfortable” as one of the usability definitions for security, wh
作者: 裝飾    時間: 2025-3-29 16:02
Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH System) application. This research uses qualitative methods by analyzing online news media. The news is collected using the NCapture feature and then the Nvivo 12 plus software is used to manage and analyze the data. The results show that the accurate indicator in the SIDALIH application service has
作者: 努力趕上    時間: 2025-3-29 22:47

作者: 浪費時間    時間: 2025-3-30 02:25
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental h data involves sensitive information, it is necessary to require a secure way to manage and use data with the consent of each individual. To integrate and share health data securely, many frameworks using federated learning and blockchain-based system have been proposed. However, the issues of ensu
作者: 流浪者    時間: 2025-3-30 04:29

作者: Inveterate    時間: 2025-3-30 10:20
Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation academic research and industrial circles. This paper aims to develop an enterprise data security capability maturity model in the era of digital transformation. Firstly, systematic literature review (SLR) was used to build up the hierarchical model of enterprise data security, which consists of thr
作者: 強所    時間: 2025-3-30 12:28
Data Guardians’ Behaviors and?Challenges While Caring for?Others’ Personal Data necessary that workers who interact with personal data understand and practice good security and privacy habits. However, to date, there has been little examination of perceptions, behaviors, and challenges among these professionals. To address this gap, we conducted an interview study of 19 indivi
作者: forthy    時間: 2025-3-30 17:59
A Privacy-Orientated Distributed Data Storage Model for Smart Homessed for. This paper proposes a way to reduce the level of dis-trust between the end-users and the companies that offer smart home hard-ware and/or personalised software services by allowing end-users to retain an optimal degree of control over their personal data (such as voice and video recordings)
作者: 政府    時間: 2025-3-31 00:19

作者: Vital-Signs    時間: 2025-3-31 01:39

作者: ENNUI    時間: 2025-3-31 05:14
Multi-ledger Coordinating Mechanism by Smart Contract for Individual-Initiated Trustworthy Data Sharst concerns about the storage and use of sensitive personal health data is privacy. To address this issue, we propose a new Multi-Ledger Coordinating Mechanism (MLCM) with blockchain for trustworthy data sharing under the control of each individual data owner. MLCM, enabled by smart contracts, lets
作者: 最高峰    時間: 2025-3-31 11:12
Mojtaba Heydari,Fahimeh Marefato all types of end users. Privacy Impact Assessments (PIAs) is a standardized tool that identifies and assesses privacy risks associated with the use of a system. In this work, we used the results of the PIA conducted in our use case to visualize privacy risks to end users in the form of User Interf
作者: cunning    時間: 2025-3-31 16:21
https://doi.org/10.1057/9780230582989rotection Regulation (GDPR), especially when designing in a private sensitive way. Inadequate understanding of how to apply the GDPR in the game development process can lead to one of two consequences: 1. inadvertently violating the GDPR with sizeable fines as potential penalties; or 2. avoiding the
作者: 東西    時間: 2025-3-31 20:57
Reid Cramer,Trina R. Williams Shanksly, to how parents are involved in their children’s password practices. To better understand both the password practices of parents, as well as how parents are involved in their children’s password practices, we conducted a survey study of 265 parents in the United States (US) with school-aged child
作者: 諷刺滑稽戲劇    時間: 2025-3-31 22:50
https://doi.org/10.1007/978-94-011-7750-4 of usable security, but few can precisely define it in practice and in terms of how it influences users’ security behaviour and the wider security culture in organisations. This paper investigates how different sources characterise usability and usable security to identify the key aspects that affe
作者: finite    時間: 2025-4-1 04:20
H. Verwey-Jonker,P. O. M. Brackelthem to decipher in case of unauthorized intrusion from the outside. As a typical example, passwords are converted into hash values using the SHA2 algorithm and stored. However, not all web services and applications implement the ideal storage method. There have been many incidents in which personal
作者: 中和    時間: 2025-4-1 07:44

作者: Certainty    時間: 2025-4-1 11:57

作者: 摘要記錄    時間: 2025-4-1 17:21
Charles T. Bourland,Gregory L. Vogtare popular due to mass availability and ease of access. Installing such applications can lead to malware infection, including viruses and ransomware. Therefore, we explored the design of interventions to prevent the users from installing applications from unknown publishers. To this end, we conduct
作者: 我們的面粉    時間: 2025-4-1 20:59

作者: Culmination    時間: 2025-4-2 00:14





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
清涧县| 忻州市| 柯坪县| 澳门| 通榆县| 惠来县| 滦平县| 邢台市| 河间市| 白玉县| 德保县| 南宁市| 北辰区| 兴宁市| 永丰县| 望都县| 文昌市| 大洼县| 达州市| 呼玛县| 三台县| 石柱| 临颍县| 会同县| 南和县| 余江县| 湘乡市| 班玛县| 昆山市| 枣阳市| 巴中市| 金川县| 岑溪市| 南涧| 尚义县| 岐山县| 东兴市| 张家港市| 临夏县| 合水县| 乌鲁木齐县|