標(biāo)題: Titlebook: HCI for Cybersecurity, Privacy and Trust; Second International Abbas Moallem Conference proceedings 2020 Springer Nature Switzerland AG 202 [打印本頁] 作者: 無力向前 時間: 2025-3-21 17:53
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度
書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次
書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用
書目名稱HCI for Cybersecurity, Privacy and Trust年度引用學(xué)科排名
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋
書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋學(xué)科排名
作者: 內(nèi)疚 時間: 2025-3-21 22:44 作者: 詢問 時間: 2025-3-22 01:14
Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?d Reality game, CybAR, which was designed to educate users about cybersecurity in an effective and entertaining way. This research incorporates decision-making style into Technology Threat Avoidance Theory (TTAT) of CybAR game use. This paper particularly focuses on the role of decision-making style作者: 慢跑鞋 時間: 2025-3-22 07:41 作者: Repatriate 時間: 2025-3-22 11:40
Building Connections for a Secure User Experience an important topic. There is also a general lack of easily comprehensible information and awareness when it comes to new regulations like the General Data Protection Regulation (GDPR) [.]. Changes in processes or requirements that involve the use of certain data are avoided without studying the fin作者: 粗俗人 時間: 2025-3-22 16:58 作者: 忍耐 時間: 2025-3-22 18:21
Analyzing Cybersecurity Understanding Using a Brain Computer Interface, in high school and with a curriculum that engages the student’s interest in a highly technical topic. The research project presented here explores the best way to teach cybersecurity to high school students to accomplish these goals. Researchers developed and delivered cybersecurity lectures to th作者: FUSE 時間: 2025-3-22 23:54
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminals. Technology design is important for?cybersecurity, but it is also necessary to understand the inse作者: 擋泥板 時間: 2025-3-23 04:12 作者: IVORY 時間: 2025-3-23 07:11 作者: Annotate 時間: 2025-3-23 13:30 作者: 不可磨滅 時間: 2025-3-23 14:41 作者: collagen 時間: 2025-3-23 20:56
Security Matters … Until Something Else Matters More: Security Notifications on Different Form Factoown privacy and security? Will people react differently depending on the type of device and the size of the screens on which warnings are displayed? In this study we conduct a task based scenario followed by a survey in order to gauge what young adults notice when browsing online, how they react to 作者: 女歌星 時間: 2025-3-24 00:00 作者: 文字 時間: 2025-3-24 03:02
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?ons of employees [., .]. Employees report being unable to keep up with cybersecurity demands while also managing their core workload [.]. Cyber Fatigue is a weariness, aversion, or lack of motivation regarding cybersecurity [.]. It manifests due to overexposure to cybersecurity and a lack of availab作者: RAFF 時間: 2025-3-24 08:38 作者: 半導(dǎo)體 時間: 2025-3-24 14:05 作者: 綁架 時間: 2025-3-24 18:32 作者: AORTA 時間: 2025-3-24 19:54 作者: antiandrogen 時間: 2025-3-24 23:09
Alejandro Díaz de León,Moisés J. Schwartzpplications in various domains, no AR application is available to educate users and increase their awareness of cybersecurity issues. Thus, we developed a game based on AR techniques as an Android app called CybAR. Since there have been few acceptance studies in the field of AR, it was particularly 作者: 蝕刻術(shù) 時間: 2025-3-25 06:05
https://doi.org/10.1007/978-1-349-27569-4d Reality game, CybAR, which was designed to educate users about cybersecurity in an effective and entertaining way. This research incorporates decision-making style into Technology Threat Avoidance Theory (TTAT) of CybAR game use. This paper particularly focuses on the role of decision-making style作者: 難取悅 時間: 2025-3-25 08:07
Does Local Financial Development Matter?,an-centric interventions. Whilst some studies have previously investigated the importance of end-user individual differences (gender, age, education, risk-taking preferences, decision-making style, personality and impulsivity) the current study extended the research to also include acceptance of the作者: 畢業(yè)典禮 時間: 2025-3-25 13:57 作者: Spirometry 時間: 2025-3-25 18:20 作者: MAIZE 時間: 2025-3-25 23:12
Conclusions and Recommendations, in high school and with a curriculum that engages the student’s interest in a highly technical topic. The research project presented here explores the best way to teach cybersecurity to high school students to accomplish these goals. Researchers developed and delivered cybersecurity lectures to th作者: Foolproof 時間: 2025-3-26 03:51
Hydrothermal Fluid-Seawater Barrier Zone given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminals. Technology design is important for?cybersecurity, but it is also necessary to understand the inse作者: medium 時間: 2025-3-26 07:38
https://doi.org/10.1057/9780230276093actor related threats. AWATO offers an interactive experience where players assume the role of a security analyst where they must observe characters within an office, monitor their emails and phone calls, and identify concerning behavior (e.g. writing passwords on post-it notes).作者: Thyroid-Gland 時間: 2025-3-26 11:39 作者: Gudgeon 時間: 2025-3-26 14:40 作者: BRAND 時間: 2025-3-26 18:19
https://doi.org/10.1007/978-88-470-0513-6nal profiling when the youth reach grade 10 (age 16–17) – many young people find a topic to focus on in the secondary school and finally form a profession with the 3rd-level studies (trade school or university). Yet, this may be an outdated way, as the leaders of tomorrow will need competencies in m作者: Cabg318 時間: 2025-3-26 21:40 作者: linear 時間: 2025-3-27 04:52 作者: Clumsy 時間: 2025-3-27 08:16
Anastasios Dimou,Konstantinos Leventakosons of employees [., .]. Employees report being unable to keep up with cybersecurity demands while also managing their core workload [.]. Cyber Fatigue is a weariness, aversion, or lack of motivation regarding cybersecurity [.]. It manifests due to overexposure to cybersecurity and a lack of availab作者: antipsychotic 時間: 2025-3-27 12:13 作者: 要控制 時間: 2025-3-27 13:56
Taina Rantala,Satu Uusiautti,Kaarina M??tt?at many consider essential for their home. However, these systems are not without problems. An important one is the anxiety and the sensation of siege that can cause, i.e., that users feel insecure inside their own homes. We propose five design guides focused on consistency, through these and with t作者: 暴露他抗議 時間: 2025-3-27 21:29
Testing and Documenting Your Model,lls is dictated by its configuration file, which is a written sequence of rules expressed by a set of keys and parameters. In this paper, we investigate whether certain representations of firewall rule sets can affect understandability. To collect data for our investigation, we designed an online su作者: GIDDY 時間: 2025-3-28 01:11 作者: FILTH 時間: 2025-3-28 02:38 作者: 無可非議 時間: 2025-3-28 09:35
Security Matters … Until Something Else Matters More: Security Notifications on Different Form Factosecurity warnings and cookies notifications within the task scenario and their own daily life, as well as gather other information on their usual browsing habits on different devices, and their thoughts about online security.作者: epicardium 時間: 2025-3-28 12:40
The Man in the Besieged Castle: Heuristic Evaluation of Home Security Systemshe help of five experts we perform a heuristic evaluation of three popular solutions in the market to try to find the causes that lead to the harmful effects of security systems. Our results reveal that the leading cause of the false siege is the excess of notifications.作者: Frequency 時間: 2025-3-28 14:47 作者: Stricture 時間: 2025-3-28 22:32 作者: 諷刺 時間: 2025-3-29 02:14 作者: 法律 時間: 2025-3-29 04:30
Building Connections for a Secure User Experienced to enable innovative design for human-machine interfaces in compliance with data protection and security regulation that is based on our extensive experience with industrial projects. The paper will provide examples of design concepts that address the security concerns raised while conforming to the main topics of ISO 9241.作者: 耐寒 時間: 2025-3-29 10:15 作者: instate 時間: 2025-3-29 13:48 作者: 原告 時間: 2025-3-29 19:38
Testing and Documenting Your Model,articipants with basic or intermediate knowledge of firewalls consider rule sets expressed in English to be 40% easier to understand, whereas advanced or expert firewall users deemed it to be 27% more difficult. We will discuss the reasons for these results and describe their possible implications.作者: 會犯錯誤 時間: 2025-3-29 22:59 作者: 瑣事 時間: 2025-3-30 00:56
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/h/image/420133.jpg作者: 新字 時間: 2025-3-30 07:51 作者: –吃 時間: 2025-3-30 11:36
HCI for Cybersecurity, Privacy and Trust978-3-030-50309-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: seruting 時間: 2025-3-30 15:21 作者: AMPLE 時間: 2025-3-30 19:15 作者: GLUE 時間: 2025-3-30 22:23 作者: 步兵 時間: 2025-3-31 03:14 作者: 繞著哥哥問 時間: 2025-3-31 06:34
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Gamof a study addressing the impact of gamification features on acceptance of the CybAR game. The theoretical model was tested in a quantitative study using structural equation modelling, conducted in Australia, with 95 Macquarie University students. The findings indicate that there is a significant re作者: cruise 時間: 2025-3-31 12:40
Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?tyle had a significant effect on avoidance behaviour. In particular, rational decision-making was a strongly significant moderator of avoidance behaviour and cybersecurity avoidance behaviour, while dependent and avoidant styles were less significant moderators of avoidance behaviour and cybersecuri作者: 抵消 時間: 2025-3-31 13:20
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machinenot relate to any cyber-security behaviors, however a number of individual differences were associated. These behaviors include financial risk-taking, avoidant decision-making plus ease of use, facilitating conditions, and trust in the internet. It was also found that safer cyber-security behaviors 作者: 現(xiàn)實 時間: 2025-3-31 19:47
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviouations. We did not find any factors that influence security awareness professionals’ usage of rewards and sanctions. Our findings suggest the need for a greater consideration of the human element of cyber security. In particular, campaigns should take a more informed approach to use of behaviour cha作者: 收養(yǎng) 時間: 2025-3-31 23:23 作者: Perigee 時間: 2025-4-1 05:25 作者: 榮幸 時間: 2025-4-1 08:17 作者: VERT 時間: 2025-4-1 14:14
Development of a Test Battery for Cyber Soldiersormance. This lack of correlation makes it possible to select highly skilled people as well as people on a lower skill level, but who should perform well during the education due to their high level of abilities.