派博傳思國(guó)際中心

標(biāo)題: Titlebook: Human Aspects of Information Security, Privacy and Trust; 5th International Co Theo Tryfonas Conference proceedings 2017 Springer Internati [打印本頁(yè)]

作者: Holter-monitor    時(shí)間: 2025-3-21 16:38
書目名稱Human Aspects of Information Security, Privacy and Trust影響因子(影響力)




書目名稱Human Aspects of Information Security, Privacy and Trust影響因子(影響力)學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度




書目名稱Human Aspects of Information Security, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy and Trust被引頻次




書目名稱Human Aspects of Information Security, Privacy and Trust被引頻次學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy and Trust年度引用




書目名稱Human Aspects of Information Security, Privacy and Trust年度引用學(xué)科排名




書目名稱Human Aspects of Information Security, Privacy and Trust讀者反饋




書目名稱Human Aspects of Information Security, Privacy and Trust讀者反饋學(xué)科排名





作者: superfluous    時(shí)間: 2025-3-21 21:58

作者: Promotion    時(shí)間: 2025-3-22 00:31
0302-9743 s of the 8th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publ
作者: 言外之意    時(shí)間: 2025-3-22 05:24
Conference proceedings 2017ons in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process.. The 75 papers presented in these
作者: Graphite    時(shí)間: 2025-3-22 10:07

作者: labyrinth    時(shí)間: 2025-3-22 15:13

作者: 輕率看法    時(shí)間: 2025-3-22 18:11

作者: Basilar-Artery    時(shí)間: 2025-3-23 00:19
“No Good Reason to Remove Features” that sandboxing – as currently implemented – is unlikely to be voluntarily adopted, especially by expert users. For sandboxing to become a desirable security mechanism, they must first accommodate plugins and features widely found in popular desktop apps.
作者: 變態(tài)    時(shí)間: 2025-3-23 03:59

作者: MEAN    時(shí)間: 2025-3-23 08:04
Mobile Online Proficiency and Mobile Internet Use - Findings from Finlands mobile payment. The observed differences in user categories continue to be associated with age, education level and other socio-demographic factors. This also applies to expressing worries regarding information security, which continue to associate not only with use purposes, but also with age and other individual characteristics.
作者: cutlery    時(shí)間: 2025-3-23 13:09

作者: 地名詞典    時(shí)間: 2025-3-23 16:20

作者: Mundane    時(shí)間: 2025-3-23 18:30
Assessing the Impact of Affective Feedback on End-User Security Awarenesstomatic detection of risky security behaviour within a web browser. Results gained from the research conclude an affective feedback mechanism in a browser-based environment, can promote general awareness of online security.
作者: 排他    時(shí)間: 2025-3-24 01:14

作者: Expediency    時(shí)間: 2025-3-24 02:58
Overcoming Fear of the Threat Model clear that this strength can be undermined by fallibility. The question we need to ask is how do we optimise the strengths of the human element and minimise the risk they present to the system? How do we do the security job effectively without leading to a climate of fear? Unfortunately undertaking
作者: Landlocked    時(shí)間: 2025-3-24 09:53

作者: 大溝    時(shí)間: 2025-3-24 10:53
Mobile Online Proficiency and Mobile Internet Use - Findings from Finlandof services. The empirical section of the paper consists of an analysis of a nationally representative survey (n?=?5,405) collected in 2012 and 2014. The data represent individuals aged 15 to 79. Our results indicate that Finns have become more active users of the mobile Internet and services such a
作者: 吸引人的花招    時(shí)間: 2025-3-24 17:53
Usability in Solutions of Secure Email – A Tools Reviewty, interdisciplinarity and diversity to the study on information security in an era marked by decentralization and ubiquity. As this phenomenon becomes increasingly common, concerns intensify regarding security, secrecy, privacy, and information governance. Consequently, secure tools have gained mo
作者: 上腭    時(shí)間: 2025-3-24 22:03
A User-Centered Model for Usable Security and Privacyd preserve privacy. At the same time, security and privacy mechanisms should not complicate workflows and must be transparent for the user. In order to master this challenge, a close involvement of the users is necessary—both at development and at run-time. In this paper, we present a user-centered
作者: RAGE    時(shí)間: 2025-3-25 00:19

作者: breadth    時(shí)間: 2025-3-25 07:09

作者: 思考才皺眉    時(shí)間: 2025-3-25 08:29
“If It’s Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It”: A Sis rise, studies have shown poor adoption rates of security measures by the target. In this paper, we conduct a qualitative investigation of 15 home users, analyse the data using Grounded Theory and present a model of factors of data security decisions made in the home. We further consolidate the li
作者: 輕觸    時(shí)間: 2025-3-25 14:18

作者: Pseudoephedrine    時(shí)間: 2025-3-25 17:33
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIsue to the usability issues that exist in the security APIs. Improving usability of security APIs would contribute to improve the security of applications that programmers develop. However, currently there is no methodology to evaluate the usability of security APIs. In this study, we attempt to impr
作者: ENNUI    時(shí)間: 2025-3-25 23:17

作者: 蠟燭    時(shí)間: 2025-3-26 03:09

作者: BAIL    時(shí)間: 2025-3-26 08:07
Dear Password, I Know You Too Wellrm of a password, a one-time password, biometrics, or all the above. However, all these forms of authentication have their inherent impairment. In this paper, the author fiercely explores archaic authentication methods calling attention to their defects, not only with their security, but also user e
作者: 光滑    時(shí)間: 2025-3-26 12:29

作者: Substance    時(shí)間: 2025-3-26 14:34

作者: acrobat    時(shí)間: 2025-3-26 18:30

作者: meretricious    時(shí)間: 2025-3-27 00:31

作者: acolyte    時(shí)間: 2025-3-27 04:28
Denis Feth,Andreas Maier,Svenja Polsthsvollen Randbedingungen auf Baustellen und die im Bauwesen typische Unikatbauweise unterliegen Beton-3D-Druckverfahren besonderen Herausforderungen. Die innovativen Technologien stehen darüber hinaus im wirtschaftlichen Wettbewerb zu konventionellen Bauverfahren. Um die Wirtschaftlichkeit und Proze
作者: 不能強(qiáng)迫我    時(shí)間: 2025-3-27 06:15
Thomas Given-Wilson,Axel Legay,Sean Sedwardsr die Studierenden des Bauingenieurwesens und der Architektur. Es soll den Studierenden an das heranführen, was heute als Stand der Technik in der Baubetriebslehre und im Projektmanagement gilt. In diesem Zusammenhang sei auf den Band 3 dieser Schriftenreihe ? Baubetriebslehre – Projektmanagement“ [
作者: 擁護(hù)    時(shí)間: 2025-3-27 12:38
Hsiao-Ying Huang,Masooda Bashirwas heute als Stand der Technik in der Baubetriebslehre und im Projektmanagement gilt. In diesem Zusammenhang sei auf den Band 3 dieser Schriftenreihe ? Baubetriebslehre – Projektmanagement“ [7] verwiesen. Auf keinen Fall erhebt das Buch den Anspruch, neue, noch nicht bekannte wissenschaftliche Erru
作者: 復(fù)習(xí)    時(shí)間: 2025-3-27 13:55

作者: 衰老    時(shí)間: 2025-3-27 20:39
Lynsay A. Shepherd,Jacqueline Archibald,Robert Ian Ferguson. Jürgen Friedrich, Prof. Dr.-Ing. Alfons Hilmer und Prof. Dipl.-Ing. Richard Wei? erstellt. Der besondere Dank der Auto- ren gilt Herrn Dipl.-Ing. Ewald-J. Weichenmeier von der Tiefbau-Berufsgenossenschaft für die Bearbeitung des Kapitels Sicherheitstechnik. Der Band Baubetriebslehre gliedert sich
作者: 顧客    時(shí)間: 2025-3-28 00:45
Chamila Wijayarathna,Nalin A. G. Arachchilage,Jill Slay. Jürgen Friedrich, Prof. Dr.-Ing. Alfons Hilmer und Prof. Dipl.-Ing. Richard Wei? erstellt. Der besondere Dank der Auto- ren gilt Herrn Dipl.-Ing. Ewald-J. Weichenmeier von der Tiefbau-Berufsgenossenschaft für die Bearbeitung des Kapitels Sicherheitstechnik. Der Band Baubetriebslehre gliedert sich
作者: 無(wú)動(dòng)于衷    時(shí)間: 2025-3-28 05:25
Panagiotis Zagouras,Christos Kalloniatis,Stefanos Gritzalisriedrich, Prof. Dr.-Ing. Alfons Hilmer und Prof. Dipl.-Ing. Richard Wei? erstellt. Der besondere Dank der Auto- ren gilt Herrn Dipl.-Ing. Ewald-J. Weichenmeier von der Tiefbau-Berufsgenossenschaft für die Bearbeitung des Kapitels Sicherheitstechnik. Der Band Baubetriebslehre gliedert sich ein in ein
作者: 折磨    時(shí)間: 2025-3-28 08:41

作者: 放逐    時(shí)間: 2025-3-28 13:41

作者: Repetitions    時(shí)間: 2025-3-28 17:44
Frans F. Blauwllen die Zielerreichung für das Projekt sichern. Dies setzt entsprechende Methoden und Werkzeuge voraus. ?hnlich wie Unternehmensorganisationen sind Projektorganisationen aber auch sozio-?konomische Systeme, d. h., sie sind soziale Gebilde mit einer wirtschaftlich ausgerichteten Zielsetzung. Neben d
作者: 推崇    時(shí)間: 2025-3-28 21:53

作者: Focus-Words    時(shí)間: 2025-3-29 01:03

作者: Conserve    時(shí)間: 2025-3-29 05:13
Haiyue Yuan,Shujun Li,Patrice Rusconi,Nouf Aljaffanllen die Zielerreichung für das Projekt sichern. Dies setzt entsprechende Methoden und Werkzeuge voraus. ?hnlich wie Unternehmensorganisationen sind Projektorganisationen aber auch sozio-?konomische Systeme, d. h., sie sind soziale Gebilde mit einer wirtschaftlich ausgerichteten Zielsetzung. Neben d
作者: OTTER    時(shí)間: 2025-3-29 10:39
978-3-319-58459-1Springer International Publishing AG 2017
作者: Simulate    時(shí)間: 2025-3-29 12:43

作者: 舉止粗野的人    時(shí)間: 2025-3-29 18:59
Theo TryfonasIncludes supplementary material: .Includes supplementary material:
作者: organic-matrix    時(shí)間: 2025-3-29 22:53

作者: Cupidity    時(shí)間: 2025-3-30 00:45

作者: moribund    時(shí)間: 2025-3-30 04:34

作者: cravat    時(shí)間: 2025-3-30 11:44

作者: MITE    時(shí)間: 2025-3-30 14:50

作者: 虛假    時(shí)間: 2025-3-30 19:50
Android App Permission and Users’ Adoption: A Case Study of Mental Health Applicationsers’ anxiety app adoption. We found that anxiety apps with more app permissions have higher installs. Also, certain app permissions are significantly related to the installation and rating of apps, such as the permission of in-app purchases, cameras, and location. This study provides a big picture
作者: 樹(shù)上結(jié)蜜糖    時(shí)間: 2025-3-30 21:18
Managing User Experience: Usability and Security in a New Era of Software Supremacy-friendly software. The current paper moves into this direction by presenting scientific definitions for the concepts of ‘user experience’, ‘usability’ and ‘security’, their extensions and implications, and the research which has explored ways of harmonizing usability and security in contemporary so
作者: 值得贊賞    時(shí)間: 2025-3-31 04:33
PSV (Password Security Visualizer): From Password Checking to User Educationmative and recommended by most participants as a good educational tool. To the best of our knowledge, PSV is the first system combining different PPCs together for user education, and the user study is the first of this kind on comparing educational effectiveness of different PPCs (and PPC-like pass
作者: AV-node    時(shí)間: 2025-3-31 07:02
Live Gaze-Based Authentication and Gaming Systeme human following the pattern displayed. To this its deployment in an eye controlled system, we developed a gaze-controlled game that relies on user eye movement for input and applied the authentication system to the game.
作者: 娘娘腔    時(shí)間: 2025-3-31 11:55
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systemscted from an eye-tracking user study to facilitate the design of cognitive modeling tasks. This allowed us to reproduce some insecure human behavioral patterns observed in some previous lab-based user studies on the same system, and more importantly, we also found some unexpected new results about h
作者: urethritis    時(shí)間: 2025-3-31 14:03
Steve Dodier-Lazaro,Ingolf Becker,Jens Krinke,M. Angela Sasse
作者: agonist    時(shí)間: 2025-3-31 17:31
0302-9743 II: clinical and health information systems; health and aging; health data analytics and visualization; and design for safety.?.978-3-319-58459-1978-3-319-58460-7Series ISSN 0302-9743 Series E-ISSN 1611-3349




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
隆安县| 泸州市| 开化县| 正宁县| 错那县| 江陵县| 凤翔县| 屯门区| 惠安县| 武定县| 察哈| 南康市| 佛山市| 邵阳县| 德格县| 南郑县| 米易县| 高唐县| 洪泽县| 绥芬河市| 清新县| 许昌市| 南通市| 宁河县| 垣曲县| 贡山| 丹棱县| 安达市| 青河县| 唐山市| 禹州市| 甘洛县| 石家庄市| 冕宁县| 卓尼县| 乌拉特前旗| 尉氏县| 察隅县| 清苑县| 濉溪县| 马尔康县|