標(biāo)題: Titlebook: Human Aspects of Information Security, Privacy and Trust; 5th International Co Theo Tryfonas Conference proceedings 2017 Springer Internati [打印本頁(yè)] 作者: Holter-monitor 時(shí)間: 2025-3-21 16:38
書目名稱Human Aspects of Information Security, Privacy and Trust影響因子(影響力)
書目名稱Human Aspects of Information Security, Privacy and Trust影響因子(影響力)學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度
書目名稱Human Aspects of Information Security, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy and Trust被引頻次
書目名稱Human Aspects of Information Security, Privacy and Trust被引頻次學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy and Trust年度引用
書目名稱Human Aspects of Information Security, Privacy and Trust年度引用學(xué)科排名
書目名稱Human Aspects of Information Security, Privacy and Trust讀者反饋
書目名稱Human Aspects of Information Security, Privacy and Trust讀者反饋學(xué)科排名
作者: superfluous 時(shí)間: 2025-3-21 21:58 作者: Promotion 時(shí)間: 2025-3-22 00:31
0302-9743 s of the 8th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publ作者: 言外之意 時(shí)間: 2025-3-22 05:24
Conference proceedings 2017ons in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada.. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process.. The 75 papers presented in these 作者: Graphite 時(shí)間: 2025-3-22 10:07 作者: labyrinth 時(shí)間: 2025-3-22 15:13 作者: 輕率看法 時(shí)間: 2025-3-22 18:11 作者: Basilar-Artery 時(shí)間: 2025-3-23 00:19
“No Good Reason to Remove Features” that sandboxing – as currently implemented – is unlikely to be voluntarily adopted, especially by expert users. For sandboxing to become a desirable security mechanism, they must first accommodate plugins and features widely found in popular desktop apps.作者: 變態(tài) 時(shí)間: 2025-3-23 03:59 作者: MEAN 時(shí)間: 2025-3-23 08:04
Mobile Online Proficiency and Mobile Internet Use - Findings from Finlands mobile payment. The observed differences in user categories continue to be associated with age, education level and other socio-demographic factors. This also applies to expressing worries regarding information security, which continue to associate not only with use purposes, but also with age and other individual characteristics.作者: cutlery 時(shí)間: 2025-3-23 13:09 作者: 地名詞典 時(shí)間: 2025-3-23 16:20 作者: Mundane 時(shí)間: 2025-3-23 18:30
Assessing the Impact of Affective Feedback on End-User Security Awarenesstomatic detection of risky security behaviour within a web browser. Results gained from the research conclude an affective feedback mechanism in a browser-based environment, can promote general awareness of online security.作者: 排他 時(shí)間: 2025-3-24 01:14 作者: Expediency 時(shí)間: 2025-3-24 02:58
Overcoming Fear of the Threat Model clear that this strength can be undermined by fallibility. The question we need to ask is how do we optimise the strengths of the human element and minimise the risk they present to the system? How do we do the security job effectively without leading to a climate of fear? Unfortunately undertaking作者: Landlocked 時(shí)間: 2025-3-24 09:53 作者: 大溝 時(shí)間: 2025-3-24 10:53
Mobile Online Proficiency and Mobile Internet Use - Findings from Finlandof services. The empirical section of the paper consists of an analysis of a nationally representative survey (n?=?5,405) collected in 2012 and 2014. The data represent individuals aged 15 to 79. Our results indicate that Finns have become more active users of the mobile Internet and services such a作者: 吸引人的花招 時(shí)間: 2025-3-24 17:53
Usability in Solutions of Secure Email – A Tools Reviewty, interdisciplinarity and diversity to the study on information security in an era marked by decentralization and ubiquity. As this phenomenon becomes increasingly common, concerns intensify regarding security, secrecy, privacy, and information governance. Consequently, secure tools have gained mo作者: 上腭 時(shí)間: 2025-3-24 22:03
A User-Centered Model for Usable Security and Privacyd preserve privacy. At the same time, security and privacy mechanisms should not complicate workflows and must be transparent for the user. In order to master this challenge, a close involvement of the users is necessary—both at development and at run-time. In this paper, we present a user-centered 作者: RAGE 時(shí)間: 2025-3-25 00:19 作者: breadth 時(shí)間: 2025-3-25 07:09 作者: 思考才皺眉 時(shí)間: 2025-3-25 08:29
“If It’s Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It”: A Sis rise, studies have shown poor adoption rates of security measures by the target. In this paper, we conduct a qualitative investigation of 15 home users, analyse the data using Grounded Theory and present a model of factors of data security decisions made in the home. We further consolidate the li作者: 輕觸 時(shí)間: 2025-3-25 14:18 作者: Pseudoephedrine 時(shí)間: 2025-3-25 17:33
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIsue to the usability issues that exist in the security APIs. Improving usability of security APIs would contribute to improve the security of applications that programmers develop. However, currently there is no methodology to evaluate the usability of security APIs. In this study, we attempt to impr作者: ENNUI 時(shí)間: 2025-3-25 23:17 作者: 蠟燭 時(shí)間: 2025-3-26 03:09 作者: BAIL 時(shí)間: 2025-3-26 08:07
Dear Password, I Know You Too Wellrm of a password, a one-time password, biometrics, or all the above. However, all these forms of authentication have their inherent impairment. In this paper, the author fiercely explores archaic authentication methods calling attention to their defects, not only with their security, but also user e作者: 光滑 時(shí)間: 2025-3-26 12:29 作者: Substance 時(shí)間: 2025-3-26 14:34 作者: acrobat 時(shí)間: 2025-3-26 18:30 作者: meretricious 時(shí)間: 2025-3-27 00:31 作者: acolyte 時(shí)間: 2025-3-27 04:28
Denis Feth,Andreas Maier,Svenja Polsthsvollen Randbedingungen auf Baustellen und die im Bauwesen typische Unikatbauweise unterliegen Beton-3D-Druckverfahren besonderen Herausforderungen. Die innovativen Technologien stehen darüber hinaus im wirtschaftlichen Wettbewerb zu konventionellen Bauverfahren. Um die Wirtschaftlichkeit und Proze作者: 不能強(qiáng)迫我 時(shí)間: 2025-3-27 06:15
Thomas Given-Wilson,Axel Legay,Sean Sedwardsr die Studierenden des Bauingenieurwesens und der Architektur. Es soll den Studierenden an das heranführen, was heute als Stand der Technik in der Baubetriebslehre und im Projektmanagement gilt. In diesem Zusammenhang sei auf den Band 3 dieser Schriftenreihe ? Baubetriebslehre – Projektmanagement“ [作者: 擁護(hù) 時(shí)間: 2025-3-27 12:38
Hsiao-Ying Huang,Masooda Bashirwas heute als Stand der Technik in der Baubetriebslehre und im Projektmanagement gilt. In diesem Zusammenhang sei auf den Band 3 dieser Schriftenreihe ? Baubetriebslehre – Projektmanagement“ [7] verwiesen. Auf keinen Fall erhebt das Buch den Anspruch, neue, noch nicht bekannte wissenschaftliche Erru作者: 復(fù)習(xí) 時(shí)間: 2025-3-27 13:55 作者: 衰老 時(shí)間: 2025-3-27 20:39
Lynsay A. Shepherd,Jacqueline Archibald,Robert Ian Ferguson. Jürgen Friedrich, Prof. Dr.-Ing. Alfons Hilmer und Prof. Dipl.-Ing. Richard Wei? erstellt. Der besondere Dank der Auto- ren gilt Herrn Dipl.-Ing. Ewald-J. Weichenmeier von der Tiefbau-Berufsgenossenschaft für die Bearbeitung des Kapitels Sicherheitstechnik. Der Band Baubetriebslehre gliedert sich 作者: 顧客 時(shí)間: 2025-3-28 00:45
Chamila Wijayarathna,Nalin A. G. Arachchilage,Jill Slay. Jürgen Friedrich, Prof. Dr.-Ing. Alfons Hilmer und Prof. Dipl.-Ing. Richard Wei? erstellt. Der besondere Dank der Auto- ren gilt Herrn Dipl.-Ing. Ewald-J. Weichenmeier von der Tiefbau-Berufsgenossenschaft für die Bearbeitung des Kapitels Sicherheitstechnik. Der Band Baubetriebslehre gliedert sich 作者: 無(wú)動(dòng)于衷 時(shí)間: 2025-3-28 05:25
Panagiotis Zagouras,Christos Kalloniatis,Stefanos Gritzalisriedrich, Prof. Dr.-Ing. Alfons Hilmer und Prof. Dipl.-Ing. Richard Wei? erstellt. Der besondere Dank der Auto- ren gilt Herrn Dipl.-Ing. Ewald-J. Weichenmeier von der Tiefbau-Berufsgenossenschaft für die Bearbeitung des Kapitels Sicherheitstechnik. Der Band Baubetriebslehre gliedert sich ein in ein作者: 折磨 時(shí)間: 2025-3-28 08:41 作者: 放逐 時(shí)間: 2025-3-28 13:41 作者: Repetitions 時(shí)間: 2025-3-28 17:44
Frans F. Blauwllen die Zielerreichung für das Projekt sichern. Dies setzt entsprechende Methoden und Werkzeuge voraus. ?hnlich wie Unternehmensorganisationen sind Projektorganisationen aber auch sozio-?konomische Systeme, d. h., sie sind soziale Gebilde mit einer wirtschaftlich ausgerichteten Zielsetzung. Neben d作者: 推崇 時(shí)間: 2025-3-28 21:53 作者: Focus-Words 時(shí)間: 2025-3-29 01:03 作者: Conserve 時(shí)間: 2025-3-29 05:13
Haiyue Yuan,Shujun Li,Patrice Rusconi,Nouf Aljaffanllen die Zielerreichung für das Projekt sichern. Dies setzt entsprechende Methoden und Werkzeuge voraus. ?hnlich wie Unternehmensorganisationen sind Projektorganisationen aber auch sozio-?konomische Systeme, d. h., sie sind soziale Gebilde mit einer wirtschaftlich ausgerichteten Zielsetzung. Neben d作者: OTTER 時(shí)間: 2025-3-29 10:39
978-3-319-58459-1Springer International Publishing AG 2017作者: Simulate 時(shí)間: 2025-3-29 12:43 作者: 舉止粗野的人 時(shí)間: 2025-3-29 18:59
Theo TryfonasIncludes supplementary material: .Includes supplementary material: 作者: organic-matrix 時(shí)間: 2025-3-29 22:53 作者: Cupidity 時(shí)間: 2025-3-30 00:45 作者: moribund 時(shí)間: 2025-3-30 04:34 作者: cravat 時(shí)間: 2025-3-30 11:44 作者: MITE 時(shí)間: 2025-3-30 14:50 作者: 虛假 時(shí)間: 2025-3-30 19:50
Android App Permission and Users’ Adoption: A Case Study of Mental Health Applicationsers’ anxiety app adoption. We found that anxiety apps with more app permissions have higher installs. Also, certain app permissions are significantly related to the installation and rating of apps, such as the permission of in-app purchases, cameras, and location. This study provides a big picture 作者: 樹(shù)上結(jié)蜜糖 時(shí)間: 2025-3-30 21:18
Managing User Experience: Usability and Security in a New Era of Software Supremacy-friendly software. The current paper moves into this direction by presenting scientific definitions for the concepts of ‘user experience’, ‘usability’ and ‘security’, their extensions and implications, and the research which has explored ways of harmonizing usability and security in contemporary so作者: 值得贊賞 時(shí)間: 2025-3-31 04:33
PSV (Password Security Visualizer): From Password Checking to User Educationmative and recommended by most participants as a good educational tool. To the best of our knowledge, PSV is the first system combining different PPCs together for user education, and the user study is the first of this kind on comparing educational effectiveness of different PPCs (and PPC-like pass作者: AV-node 時(shí)間: 2025-3-31 07:02
Live Gaze-Based Authentication and Gaming Systeme human following the pattern displayed. To this its deployment in an eye controlled system, we developed a gaze-controlled game that relies on user eye movement for input and applied the authentication system to the game.作者: 娘娘腔 時(shí)間: 2025-3-31 11:55
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systemscted from an eye-tracking user study to facilitate the design of cognitive modeling tasks. This allowed us to reproduce some insecure human behavioral patterns observed in some previous lab-based user studies on the same system, and more importantly, we also found some unexpected new results about h作者: urethritis 時(shí)間: 2025-3-31 14:03
Steve Dodier-Lazaro,Ingolf Becker,Jens Krinke,M. Angela Sasse作者: agonist 時(shí)間: 2025-3-31 17:31
0302-9743 II: clinical and health information systems; health and aging; health data analytics and visualization; and design for safety.?.978-3-319-58459-1978-3-319-58460-7Series ISSN 0302-9743 Series E-ISSN 1611-3349