派博傳思國際中心

標(biāo)題: Titlebook: HCI for Cybersecurity, Privacy and Trust; Second International Abbas Moallem Conference proceedings 2020 Springer Nature Switzerland AG 202 [打印本頁]

作者: 無力向前    時間: 2025-3-21 17:53
書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)




書目名稱HCI for Cybersecurity, Privacy and Trust影響因子(影響力)學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度




書目名稱HCI for Cybersecurity, Privacy and Trust網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次




書目名稱HCI for Cybersecurity, Privacy and Trust被引頻次學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust年度引用




書目名稱HCI for Cybersecurity, Privacy and Trust年度引用學(xué)科排名




書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋




書目名稱HCI for Cybersecurity, Privacy and Trust讀者反饋學(xué)科排名





作者: 內(nèi)疚    時間: 2025-3-21 22:44

作者: 詢問    時間: 2025-3-22 01:14
Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?d Reality game, CybAR, which was designed to educate users about cybersecurity in an effective and entertaining way. This research incorporates decision-making style into Technology Threat Avoidance Theory (TTAT) of CybAR game use. This paper particularly focuses on the role of decision-making style
作者: 慢跑鞋    時間: 2025-3-22 07:41

作者: Repatriate    時間: 2025-3-22 11:40
Building Connections for a Secure User Experience an important topic. There is also a general lack of easily comprehensible information and awareness when it comes to new regulations like the General Data Protection Regulation (GDPR) [.]. Changes in processes or requirements that involve the use of certain data are avoided without studying the fin
作者: 粗俗人    時間: 2025-3-22 16:58

作者: 忍耐    時間: 2025-3-22 18:21
Analyzing Cybersecurity Understanding Using a Brain Computer Interface, in high school and with a curriculum that engages the student’s interest in a highly technical topic. The research project presented here explores the best way to teach cybersecurity to high school students to accomplish these goals. Researchers developed and delivered cybersecurity lectures to th
作者: FUSE    時間: 2025-3-22 23:54
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminals. Technology design is important for?cybersecurity, but it is also necessary to understand the inse
作者: 擋泥板    時間: 2025-3-23 04:12

作者: IVORY    時間: 2025-3-23 07:11

作者: Annotate    時間: 2025-3-23 13:30

作者: 不可磨滅    時間: 2025-3-23 14:41

作者: collagen    時間: 2025-3-23 20:56
Security Matters … Until Something Else Matters More: Security Notifications on Different Form Factoown privacy and security? Will people react differently depending on the type of device and the size of the screens on which warnings are displayed? In this study we conduct a task based scenario followed by a survey in order to gauge what young adults notice when browsing online, how they react to
作者: 女歌星    時間: 2025-3-24 00:00

作者: 文字    時間: 2025-3-24 03:02
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?ons of employees [., .]. Employees report being unable to keep up with cybersecurity demands while also managing their core workload [.]. Cyber Fatigue is a weariness, aversion, or lack of motivation regarding cybersecurity [.]. It manifests due to overexposure to cybersecurity and a lack of availab
作者: RAFF    時間: 2025-3-24 08:38

作者: 半導(dǎo)體    時間: 2025-3-24 14:05

作者: 綁架    時間: 2025-3-24 18:32

作者: AORTA    時間: 2025-3-24 19:54

作者: antiandrogen    時間: 2025-3-24 23:09
Alejandro Díaz de León,Moisés J. Schwartzpplications in various domains, no AR application is available to educate users and increase their awareness of cybersecurity issues. Thus, we developed a game based on AR techniques as an Android app called CybAR. Since there have been few acceptance studies in the field of AR, it was particularly
作者: 蝕刻術(shù)    時間: 2025-3-25 06:05
https://doi.org/10.1007/978-1-349-27569-4d Reality game, CybAR, which was designed to educate users about cybersecurity in an effective and entertaining way. This research incorporates decision-making style into Technology Threat Avoidance Theory (TTAT) of CybAR game use. This paper particularly focuses on the role of decision-making style
作者: 難取悅    時間: 2025-3-25 08:07
Does Local Financial Development Matter?,an-centric interventions. Whilst some studies have previously investigated the importance of end-user individual differences (gender, age, education, risk-taking preferences, decision-making style, personality and impulsivity) the current study extended the research to also include acceptance of the
作者: 畢業(yè)典禮    時間: 2025-3-25 13:57

作者: Spirometry    時間: 2025-3-25 18:20

作者: MAIZE    時間: 2025-3-25 23:12
Conclusions and Recommendations, in high school and with a curriculum that engages the student’s interest in a highly technical topic. The research project presented here explores the best way to teach cybersecurity to high school students to accomplish these goals. Researchers developed and delivered cybersecurity lectures to th
作者: Foolproof    時間: 2025-3-26 03:51
Hydrothermal Fluid-Seawater Barrier Zone given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminals. Technology design is important for?cybersecurity, but it is also necessary to understand the inse
作者: medium    時間: 2025-3-26 07:38
https://doi.org/10.1057/9780230276093actor related threats. AWATO offers an interactive experience where players assume the role of a security analyst where they must observe characters within an office, monitor their emails and phone calls, and identify concerning behavior (e.g. writing passwords on post-it notes).
作者: Thyroid-Gland    時間: 2025-3-26 11:39

作者: Gudgeon    時間: 2025-3-26 14:40

作者: BRAND    時間: 2025-3-26 18:19
https://doi.org/10.1007/978-88-470-0513-6nal profiling when the youth reach grade 10 (age 16–17) – many young people find a topic to focus on in the secondary school and finally form a profession with the 3rd-level studies (trade school or university). Yet, this may be an outdated way, as the leaders of tomorrow will need competencies in m
作者: Cabg318    時間: 2025-3-26 21:40

作者: linear    時間: 2025-3-27 04:52

作者: Clumsy    時間: 2025-3-27 08:16
Anastasios Dimou,Konstantinos Leventakosons of employees [., .]. Employees report being unable to keep up with cybersecurity demands while also managing their core workload [.]. Cyber Fatigue is a weariness, aversion, or lack of motivation regarding cybersecurity [.]. It manifests due to overexposure to cybersecurity and a lack of availab
作者: antipsychotic    時間: 2025-3-27 12:13

作者: 要控制    時間: 2025-3-27 13:56
Taina Rantala,Satu Uusiautti,Kaarina M??tt?at many consider essential for their home. However, these systems are not without problems. An important one is the anxiety and the sensation of siege that can cause, i.e., that users feel insecure inside their own homes. We propose five design guides focused on consistency, through these and with t
作者: 暴露他抗議    時間: 2025-3-27 21:29
Testing and Documenting Your Model,lls is dictated by its configuration file, which is a written sequence of rules expressed by a set of keys and parameters. In this paper, we investigate whether certain representations of firewall rule sets can affect understandability. To collect data for our investigation, we designed an online su
作者: GIDDY    時間: 2025-3-28 01:11

作者: FILTH    時間: 2025-3-28 02:38

作者: 無可非議    時間: 2025-3-28 09:35
Security Matters … Until Something Else Matters More: Security Notifications on Different Form Factosecurity warnings and cookies notifications within the task scenario and their own daily life, as well as gather other information on their usual browsing habits on different devices, and their thoughts about online security.
作者: epicardium    時間: 2025-3-28 12:40
The Man in the Besieged Castle: Heuristic Evaluation of Home Security Systemshe help of five experts we perform a heuristic evaluation of three popular solutions in the market to try to find the causes that lead to the harmful effects of security systems. Our results reveal that the leading cause of the false siege is the excess of notifications.
作者: Frequency    時間: 2025-3-28 14:47

作者: Stricture    時間: 2025-3-28 22:32

作者: 諷刺    時間: 2025-3-29 02:14

作者: 法律    時間: 2025-3-29 04:30
Building Connections for a Secure User Experienced to enable innovative design for human-machine interfaces in compliance with data protection and security regulation that is based on our extensive experience with industrial projects. The paper will provide examples of design concepts that address the security concerns raised while conforming to the main topics of ISO 9241.
作者: 耐寒    時間: 2025-3-29 10:15

作者: instate    時間: 2025-3-29 13:48

作者: 原告    時間: 2025-3-29 19:38
Testing and Documenting Your Model,articipants with basic or intermediate knowledge of firewalls consider rule sets expressed in English to be 40% easier to understand, whereas advanced or expert firewall users deemed it to be 27% more difficult. We will discuss the reasons for these results and describe their possible implications.
作者: 會犯錯誤    時間: 2025-3-29 22:59

作者: 瑣事    時間: 2025-3-30 00:56
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/h/image/420133.jpg
作者: 新字    時間: 2025-3-30 07:51

作者: –吃    時間: 2025-3-30 11:36
HCI for Cybersecurity, Privacy and Trust978-3-030-50309-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: seruting    時間: 2025-3-30 15:21

作者: AMPLE    時間: 2025-3-30 19:15

作者: GLUE    時間: 2025-3-30 22:23

作者: 步兵    時間: 2025-3-31 03:14

作者: 繞著哥哥問    時間: 2025-3-31 06:34
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Gamof a study addressing the impact of gamification features on acceptance of the CybAR game. The theoretical model was tested in a quantitative study using structural equation modelling, conducted in Australia, with 95 Macquarie University students. The findings indicate that there is a significant re
作者: cruise    時間: 2025-3-31 12:40
Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?tyle had a significant effect on avoidance behaviour. In particular, rational decision-making was a strongly significant moderator of avoidance behaviour and cybersecurity avoidance behaviour, while dependent and avoidant styles were less significant moderators of avoidance behaviour and cybersecuri
作者: 抵消    時間: 2025-3-31 13:20
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machinenot relate to any cyber-security behaviors, however a number of individual differences were associated. These behaviors include financial risk-taking, avoidant decision-making plus ease of use, facilitating conditions, and trust in the internet. It was also found that safer cyber-security behaviors
作者: 現(xiàn)實    時間: 2025-3-31 19:47
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviouations. We did not find any factors that influence security awareness professionals’ usage of rewards and sanctions. Our findings suggest the need for a greater consideration of the human element of cyber security. In particular, campaigns should take a more informed approach to use of behaviour cha
作者: 收養(yǎng)    時間: 2025-3-31 23:23

作者: Perigee    時間: 2025-4-1 05:25

作者: 榮幸    時間: 2025-4-1 08:17

作者: VERT    時間: 2025-4-1 14:14
Development of a Test Battery for Cyber Soldiersormance. This lack of correlation makes it possible to select highly skilled people as well as people on a lower skill level, but who should perform well during the education due to their high level of abilities.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
东辽县| 东丰县| 报价| 河北省| 崇明县| 辽源市| 砀山县| 内乡县| 姚安县| 南昌县| 中江县| 永川市| 玛纳斯县| 鄂托克旗| 孙吴县| 靖边县| 景洪市| 理塘县| 和平县| 齐河县| 乌兰察布市| 昌平区| 双桥区| 会昌县| 融水| 台前县| 博野县| 荣昌县| 九台市| 景宁| 甘南县| 北海市| 本溪市| 教育| 黔南| 竹北市| 宣武区| 二手房| 镇康县| 佛坪县| 锡林郭勒盟|