標(biāo)題: Titlebook: HCI for Cybersecurity, Privacy and Trust; First International Abbas Moallem Conference proceedings 2019 Springer Nature Switzerland AG 201 [打印本頁(yè)] 作者: 和善 時(shí)間: 2025-3-21 19:34
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋學(xué)科排名
作者: 歹徒 時(shí)間: 2025-3-21 20:46
Consonant-Vowel-Consonants for Error-Free Code Entrycure, preferred by users, and more impervious to user error when compared to codes typically used for security purposes. An extension integrates error detection and correction, essentially eliminating typos.作者: obnoxious 時(shí)間: 2025-3-22 01:17 作者: avarice 時(shí)間: 2025-3-22 05:30
Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speecduction efficiency and visualizes the collected operation records by enhancing the readability and writability of records and handover operations that are not sufficiently supported by traditional electronic forms. To prevent falsification of inspections, it is necessary to use a widely deployed dev作者: 毛細(xì)血管 時(shí)間: 2025-3-22 09:50
Explore-a-Nation: Combining Graphical and Alphanumeric Authentication standards and to Use Your Illusion (UYI) across the dimensions of efficiency, accuracy, OSA resistance, and subjective usability. User login times for both EaN and UYI met the efficiency usability standards established by alphanumeric passwords. Results for UYI (99%) login accuracy were significant作者: fiction 時(shí)間: 2025-3-22 15:19
Gamifying Security Awareness: A New Prototypeect and accompanying research paper will explore the gamification of the security training and awareness program. By developing role-based game modules to teach secure behavior to all organizational users, incentivizing secure behavior with real rewards that matter to participants and applying the t作者: Latency 時(shí)間: 2025-3-22 20:32
Social Preferences in Decision Making Under Cybersecurity Risks and Uncertainties value and moderated by social preferences. These hypotheses are tested using a variance-based structural equation modeling analysis based on feedback from a sample of Norwegian organizations. Our empirical results confirm the strong positive impact of social preferences and cybersecurity attack exp作者: chalice 時(shí)間: 2025-3-22 23:33
Understanding Parents’ Concerns with Smart Device Usage in the Homered that parents feel it is their responsibility to keep their children from harm when they use smart devices, and that parents do not trust applications, devices, smart device manufacturers or Internet providers to do so. Our findings can help researchers better understand the different device usag作者: 后來(lái) 時(shí)間: 2025-3-23 04:38
Gamification Techniques for Raising Cyber Security Awarenesse of the password application, and felt they benefitted from the inclusion of gamification techniques. Future work seeks to expand the prototype into a full solution, covering a range of security awareness issues.作者: Indelible 時(shí)間: 2025-3-23 09:05
An Identification Method of Untrusted Interactive Behavior in ERP System Based on Markov Chaine behavior of trusted users based on these behavior characteristics. Next, the forward algorithm is used to calculate the probability of a series of observation sequences of trusted users and untrusted users based on the hidden Markov model of trusted users. Finally, the untrusted users are identifi作者: Cabg318 時(shí)間: 2025-3-23 10:36
The Automotive Development Process,emented and tested Grid Authentication’s memorability and recorded user sentiment data. Participants logged in using a newly created password, an 8-character password randomly generated for them, as well as used Grid Authentication scheme for three days each, once per day. We found that overall, Gri作者: 斗志 時(shí)間: 2025-3-23 17:05
General Motors in Spain, 1925–2017cure, preferred by users, and more impervious to user error when compared to codes typically used for security purposes. An extension integrates error detection and correction, essentially eliminating typos.作者: 偽善 時(shí)間: 2025-3-23 19:02
Organization of the nervous system,nes whether the hand features belongs to a genuine user. Our authentication system architecture completes the biometric authentication by using a limited amount of data obtained within a few seconds when a user enters a password. The advantage of the proposed method is that it prevents intrusion by 作者: 憂傷 時(shí)間: 2025-3-24 01:58 作者: GIBE 時(shí)間: 2025-3-24 03:55 作者: 一罵死割除 時(shí)間: 2025-3-24 08:31 作者: CRUMB 時(shí)間: 2025-3-24 14:37 作者: committed 時(shí)間: 2025-3-24 16:21 作者: omnibus 時(shí)間: 2025-3-24 20:25
https://doi.org/10.1007/978-3-663-09038-0e of the password application, and felt they benefitted from the inclusion of gamification techniques. Future work seeks to expand the prototype into a full solution, covering a range of security awareness issues.作者: 符合你規(guī)定 時(shí)間: 2025-3-24 23:34
https://doi.org/10.1007/978-1-84996-528-6e behavior of trusted users based on these behavior characteristics. Next, the forward algorithm is used to calculate the probability of a series of observation sequences of trusted users and untrusted users based on the hidden Markov model of trusted users. Finally, the untrusted users are identifi作者: Urologist 時(shí)間: 2025-3-25 06:22
Making Sense of Darknet Markets: Automatic Inference of Semantic Classifications from Unconventional In this paper we present a relatively fast method using unsupervised and self-supervised machine learning methods to infer image semantics from large, unstructured multimedia corpora, and demonstrate how it may aid analysts in investigating the content of Darknet Markets.作者: 草本植物 時(shí)間: 2025-3-25 07:42
Conference proceedings 2019posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions.. .HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust..作者: Conduit 時(shí)間: 2025-3-25 12:26 作者: 誘惑 時(shí)間: 2025-3-25 18:29 作者: 自愛(ài) 時(shí)間: 2025-3-25 20:41
D. W. Crowley M.A.(N.Z.), Ph.D.(Lond.) In this paper we present a relatively fast method using unsupervised and self-supervised machine learning methods to infer image semantics from large, unstructured multimedia corpora, and demonstrate how it may aid analysts in investigating the content of Darknet Markets.作者: Graves’-disease 時(shí)間: 2025-3-26 03:03
https://doi.org/10.1007/978-1-4899-7100-5at adopt warning messages as prevention of phishing attacks. The results highlighted that different aspects of UI should be better designed to limit phishing attacks. In addition, as a prevention of cyber attacks, we described an ongoing work of a questionnaire that aims to make users aware of the risks of cyber attacks.作者: outer-ear 時(shí)間: 2025-3-26 05:17
https://doi.org/10.1007/978-3-030-65764-2 risk. This article surveys the findings while noting challenges and proposed solutions to support effective provision of and user compliance with browser security warnings as well as important user study design considerations for future work – in particular, future work on the effect of screen size on user perception of browser warnings.作者: 易怒 時(shí)間: 2025-3-26 11:23 作者: 舊病復(fù)發(fā) 時(shí)間: 2025-3-26 12:40 作者: mechanical 時(shí)間: 2025-3-26 17:22 作者: 無(wú)價(jià)值 時(shí)間: 2025-3-26 22:52 作者: 尾隨 時(shí)間: 2025-3-27 01:25
D. W. Crowley M.A.(N.Z.), Ph.D.(Lond.) and holistic view of challenges in Information Security Systems, and their interrelationships. The framework is expected to provide a basis that can be used to evaluate individual organizational members’ behavior and the adequateness of existing security measures.作者: 罵人有污點(diǎn) 時(shí)間: 2025-3-27 08:25
BREAKING: Password Entry Is Fine, error rate, and number of backspaces. We then did an exploratory analysis of the data. Our findings show that, perhaps unexpectedly, there is no significant difference between masked and unmasked passwords for any of these metrics.作者: considerable 時(shí)間: 2025-3-27 12:39 作者: 泥沼 時(shí)間: 2025-3-27 13:38
Andrea Angelini,Roberto Casadeiaction, analytics, gamification and deception to lure malicious users into selected traps while piquing their interests. Furthermore we analyse the interactive deceptive aspects of the platform through the addition of a narrative, further engaging malicious users into following a predefined path and deflecting attacks from key network systems.作者: 躺下殘殺 時(shí)間: 2025-3-27 21:44 作者: 隨意 時(shí)間: 2025-3-27 22:40 作者: DEAWL 時(shí)間: 2025-3-28 05:26 作者: 最初 時(shí)間: 2025-3-28 08:43
Two-Factor Authentication Using Leap Motion and Numeric Keypadcation. Furthermore, biometric authentication was considered more secure than password authentication because it was more difficult to steal biometric information when compared to passwords. However, given the development of high-spec cameras and image recognition technology, the risk of the theft o作者: 血友病 時(shí)間: 2025-3-28 13:15
Identity Verification Using Face Recognition for Artificial-Intelligence Electronic Forms with Speecsocial problem that could undermine Japan’s manufacturing industry, which is founded on a dedication to high quality. Falsification could be prevented by ensuring transparency of the inspection process by visualizing the process. End-to-end visualization facilitates early detection and prevention of作者: 別名 時(shí)間: 2025-3-28 15:14 作者: 食草 時(shí)間: 2025-3-28 21:55 作者: 脆弱帶來(lái) 時(shí)間: 2025-3-29 02:59
From Cyber-Security Deception to Manipulation and Gratification Through Gamificationricacy of network architectures has increased the complexity of cyber-defenses, to this end, the use of deception has recently been trending both in academia and industry. Deception enables to create proactive defense systems, luring attackers in order to better defend the systems at hand. Current a作者: 有節(jié)制 時(shí)間: 2025-3-29 06:29 作者: Intrepid 時(shí)間: 2025-3-29 10:49 作者: 連詞 時(shí)間: 2025-3-29 15:06 作者: 眼界 時(shí)間: 2025-3-29 17:17
Understanding Perceptions: User Responses to Browser Warning Messageser messages may also change. This paper reviews the literature on user reactions to browser warnings, with emphasis on screen size and form factors. The literature indicates that browser warning message design, habituation, awareness of risk and screen size are aspects that effect user perception of作者: Bouquet 時(shí)間: 2025-3-29 20:41
Understanding Parents’ Concerns with Smart Device Usage in the Homeesearch regarding parents’ safety and privacy concerns about their children’s use of smart devices in the home. Given the rise in use of smart devices within the home in general, and among children in particular, we wanted to explore the privacy and safety concerns that parents have about their chil作者: aptitude 時(shí)間: 2025-3-30 02:38
Gamification Techniques for Raising Cyber Security Awarenessing of basic security measures in order to keep themselves safe online. However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area. Gamification has grown in popularity in recent years and has been used to teach people about a r作者: 使迷醉 時(shí)間: 2025-3-30 06:10 作者: OTHER 時(shí)間: 2025-3-30 08:31
A Framework of Information Security Integrated with Human Factorsaking process. In addition, they help organizations in timely implementation of projects and effective risk management. A reliable and coherent Information System requires a solid security framework that ensures Confidentiality, Integrity, Availability, Authenticity and Auditability of the critical 作者: flavonoids 時(shí)間: 2025-3-30 15:35 作者: Malaise 時(shí)間: 2025-3-30 17:08
The Automotive Development Process,o be weaker than ever. With the increase of processing power within computers, offline password attacks such as dictionary attacks, rainbow tables, and hash tables have become more effective against divulging account information from stolen databases. This has led to alternative solutions being prop作者: 寡頭政治 時(shí)間: 2025-3-30 23:47 作者: 新星 時(shí)間: 2025-3-31 04:36
Organization of the nervous system,cation. Furthermore, biometric authentication was considered more secure than password authentication because it was more difficult to steal biometric information when compared to passwords. However, given the development of high-spec cameras and image recognition technology, the risk of the theft o作者: 無(wú)能性 時(shí)間: 2025-3-31 06:16
Wieland Wermke,Maija Salokangassocial problem that could undermine Japan’s manufacturing industry, which is founded on a dedication to high quality. Falsification could be prevented by ensuring transparency of the inspection process by visualizing the process. End-to-end visualization facilitates early detection and prevention of作者: Myelin 時(shí)間: 2025-3-31 11:05 作者: 高調(diào) 時(shí)間: 2025-3-31 15:58 作者: photopsia 時(shí)間: 2025-3-31 20:01