標題: Titlebook: Human Aspects of Information Security, Privacy, and Trust; 4th International Co Theo Tryfonas Conference proceedings 2016 Springer Internat [打印本頁] 作者: Filament 時間: 2025-3-21 18:58
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)學科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust網絡公開度
書目名稱Human Aspects of Information Security, Privacy, and Trust網絡公開度學科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次
書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次學科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用
書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用學科排名
書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋
書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋學科排名
作者: Amenable 時間: 2025-3-21 23:42
Theo TryfonasIncludes supplementary material: 作者: 腐蝕 時間: 2025-3-22 03:15
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/h/image/428972.jpg作者: Humble 時間: 2025-3-22 08:34 作者: 孵卵器 時間: 2025-3-22 11:24 作者: Ophthalmologist 時間: 2025-3-22 14:45 作者: anticipate 時間: 2025-3-22 18:56
User Identification Using Gamesfect system. In this paper we present the notion of using videogames, specifically Tetris, to supplement traditional authentication methods and provide an additional layer of identity validation. Two experiments were undertaken that required participants to play a modified version of Tetris; the fir作者: multiply 時間: 2025-3-23 00:32 作者: micronutrients 時間: 2025-3-23 03:44
Implicit Authentication for Mobile Devices Using Typing Behaviorportion of the user’s sensitive data and communications. We propose a secondary implicit authentication scheme which monitors typing behavior to detect unauthorized use and lock down the mobile device. We build a basic implementation of our scheme on the Android operating system. Our user studies on作者: LUDE 時間: 2025-3-23 06:11 作者: 詞匯記憶方法 時間: 2025-3-23 11:36 作者: 大雨 時間: 2025-3-23 14:07
Anonymous Authentication with a Bi-directional Identity Federation in the Cloud. In the cloud architecture, user space may be shared across various resources, leading to possible data exposure, and making mapping of users and their privileges a challenging job. Moreover the user has to keep track of many passwords and tokens for different applications. In many setting, anonymi作者: 多嘴 時間: 2025-3-23 18:07 作者: Reservation 時間: 2025-3-24 01:01 作者: ARENA 時間: 2025-3-24 04:10
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Perthe software lifecycle, focusing on the early design phase and mitigating privacy risks. As a departure point, we used Personal Health Information Act (PHIA) in Nova Scotia to derive the following five proposed privacy patterns: 1-request an access 2-request a correction 3-request not to disclose Pe作者: defuse 時間: 2025-3-24 08:29
Information Security Application Design: Understanding Your Usersonal methods of creating Personas are time-consuming. In this work, members of the Rapid7 User Experience team illustrate how they have quickly created Personas using the Proto-Persona method. The method, which encapsulates a collective set of beliefs that an organization has about their users, enab作者: escalate 時間: 2025-3-24 11:14
Responsibility Modelling and Its Application Trust Managementt trust can be measured in-terms of reliability and dependability, while from a socio standpoint trust can be viewed as (a) the Need to trust, trust based on Identification, trust based on Competence and finally trust based on Evidence. In this paper we will develop a socio-technical model of trust 作者: Contracture 時間: 2025-3-24 16:16
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banksof human behaviour, based on relevant theories like deterrence theory and the theory of planned behaviour. We conduct a survey of IT professionals, managers and employees of selected banks from Nigeria as part of a sector case study focussed in this region. Our findings suggest that security by comp作者: 急急忙忙 時間: 2025-3-24 22:37
Current Trend of End-Users’ Behaviors Towards Security Mechanismsare being rapidly modified sophisticatedly. Consequently, end-users’ behaviors are being changed, newly developed, and/or innovated as a result of the modifications of the mechanisms. Therefore, tracing the change of the end-user’s security related behaviors is an essential activity that should get 作者: 遺傳 時間: 2025-3-24 23:16 作者: 小樣他閑聊 時間: 2025-3-25 06:34 作者: Lice692 時間: 2025-3-25 10:31 作者: ACME 時間: 2025-3-25 11:42
Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective use online services which place their personal information at risk, comprising a Privacy Paradox. Previous work has analysed this phenomenon through after-the-fact comparisons, but not studied disclosure behaviour during questioning. We physically surveyed UK cities to study how the British public 作者: 星球的光亮度 時間: 2025-3-25 19:35
Oliver Buckley,Duncan Hodgesstand dieses Wissenschaftsgebietes sind damit die Gesetzm??igkeiten, die den strukturellen Aufbau und die wechselseitige Umwandlung der ungeheuren Vielfalt von Stoffen bestimmen. Die Chemie ist in erster Linie eine experimentelle Wissenschaft. Akkumuliertes Wissen, neue Anschauungen und Konzepte sin作者: 尖酸一點 時間: 2025-3-25 21:21
Kulpreet Chilana,Federico Casalegnostand dieses Wissenschaftsgebietes sind damit die Gesetzm??igkeiten, die den strukturellen Aufbau und die wechselseitige Umwandlung der ungeheuren Vielfalt von Stoffen bestimmen. Die Chemie ist in erster Linie eine experimentelle Wissenschaft. Akkumuliertes Wissen, neue Anschauungen und Konzepte sin作者: octogenarian 時間: 2025-3-26 00:54 作者: OPINE 時間: 2025-3-26 07:04
Tesleem Fagade,Theo Tryfonasftlich. Unendliche M?glichkeiten er?ffnen sich dabei, locken mit enormer Vielfalt, fordern uns gleichzeitig heraus, mit der Komplexit?t realer oder virtueller Welten umzugehen. Unser Bemühen, Situationen und Fakten m?glichst ganzheitlich zu erfassen, realistisch einzusch?tzen und allseits umfassend,作者: 一個姐姐 時間: 2025-3-26 12:08
Yasser M. Hausawiftlich. Unendliche M?glichkeiten er?ffnen sich dabei, locken mit enormer Vielfalt, fordern uns gleichzeitig heraus, mit der Komplexit?t realer oder virtueller Welten umzugehen. Unser Bemühen, Situationen und Fakten m?glichst ganzheitlich zu erfassen, realistisch einzusch?tzen und allseits umfassend,作者: 過剩 時間: 2025-3-26 14:36
Teresa Schmidt,Ralf Philipsen,Martina Zieflefachlichen, empathischen und interkulturellen Kompetenzen ist die Basis für ein Handeln im Management mit einem gutem (Bauch-)Gefühl. Empathie statt Kommando und Kontrolle. Von Führungskr?ften im Management wird angenommen, sie müssen Entscheidungen rational treffen, indem sie Informationen sammeln 作者: 揉雜 時間: 2025-3-26 18:05 作者: SEEK 時間: 2025-3-26 23:22
Andrew Blythzt wird – gerade in Zeiten von Angst und Unsicherheit..Der Inhalt.??.- Das Bauchgefühl im Spiegel der Gesellschaft: Grundlagen und aktuelle Entwicklungen.- Die Bedeutung des Bauchgefühls in der Wirtschaft.- Bau978-3-662-63667-1作者: 嚴厲批評 時間: 2025-3-27 04:45 作者: Comprise 時間: 2025-3-27 07:22
Takashi Tsuchiya,Masahiro Fujita,Kenta Takahashi,Takehisa Kato,Fumihiko Magata,Yoshimi Teshigawara,R作者: 我吃花盤旋 時間: 2025-3-27 11:49 作者: TAP 時間: 2025-3-27 16:13 作者: 歡樂中國 時間: 2025-3-27 19:54
Vibration Based Tangible Tokens for Intuitive Pairing Among Smart Devicesbetween the two devices is activated, when the devices sense and detect the vibration frequency of a token that was placed on their screens. For pairing, the devices use frequency information as authentication key. The proposed technique easily allows users to pair with the target device without kno作者: cavity 時間: 2025-3-28 01:24
Responsibility Modelling and Its Application Trust Managementators. From this model we will explore the relationship between the elements of a tasks execution and the actions communication associated with a task and hence a responsibility. We will use this logical model to show how a argument of consistency can be constructed and from that a measure of trust 作者: Subjugate 時間: 2025-3-28 03:12
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secretunintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled fr作者: 極端的正確性 時間: 2025-3-28 07:15 作者: 縮短 時間: 2025-3-28 13:22
Oliver Buckley,Duncan Hodgesgie, Geologie und Mineralogie eng verknüpft und eine strenge Abgrenzung des Aufgabengebiets der Chemie von dem der übrigen naturwissenschaftlichen Disziplinen ist weder sinnvoll noch notwendig. Ziel der chemischen Forschung ist die Synthese von Substanzen mit v?llig neuen Eigenschaften. Damit ist di作者: Graduated 時間: 2025-3-28 18:16 作者: FLASK 時間: 2025-3-28 20:01 作者: 大炮 時間: 2025-3-28 23:46
Yasser M. Hausawiermeiden wir Irrwege und wie treten wir Irrglauben entgegen? Wie treffen wir richtige Entscheidungen? Der Beitrag von Felicitas Birkner zeigt, dass Zukunft Pers?nlichkeit braucht und die Nutzung aller Potenziale fordert: in Balance – aus der Mitte – Impulse von innen.作者: 清楚 時間: 2025-3-29 03:44 作者: 和平主義者 時間: 2025-3-29 07:53 作者: HAIRY 時間: 2025-3-29 15:24
Human Aspects of Information Security, Privacy, and Trust4th International Co作者: fertilizer 時間: 2025-3-29 15:52
Anonymous Authentication with a Bi-directional Identity Federation in the Cloudted identity management scheme that allows for anonymous authentication of users. Our proposed scheme is applicable to any combination of horizontal and vertical federations, across multiple cloud layers.作者: 水汽 時間: 2025-3-29 22:28 作者: BAN 時間: 2025-3-30 03:07 作者: Cholesterol 時間: 2025-3-30 04:07
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banksgulators should promote holistic change of security culture across the sector. Based on an established model of Information Security Governance Framework, we propose how information security may be embedded into organisation security culture in that context.作者: 皺痕 時間: 2025-3-30 10:01 作者: cardiopulmonary 時間: 2025-3-30 16:25
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Perrsonal Health Information 4-being notified if the PHI is lost, stolen or subject to unauthorized access 5-request a review. The patterns provide a guide to designers and developers in designing privacy-preserving systems in healthcare.作者: 廣大 時間: 2025-3-30 20:00
Information Security Application Design: Understanding Your Usersled our organization to capture stories of 80 characters. Refining these during the process, resulted in 16 Proto-Personas, which were visualized within a Persona Ecosystem. This Ecosystem, and the Personas within, has allowed Rapid7 to design the right Information Security applications for the right users at the right time.作者: 我不怕犧牲 時間: 2025-3-30 20:44 作者: antidepressant 時間: 2025-3-31 04:20
Conference proceedings 2016Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas..The 25 papers presented in the HAS 2016 proceedings are organized in topical sections as follows: human factors of authentication; security, privacy, and human behavior; and security technologies.作者: 遠地點 時間: 2025-3-31 08:56 作者: 鑲嵌細工 時間: 2025-3-31 13:11
Hermes: Hands-Free Authentication in Physical Spaces show a considerable improvement in the time required to authenticate via Hermes, as opposed to traditional authentication methods. We also evaluate the accuracy of Bluetooth LE for use in such a system.作者: Mumble 時間: 2025-3-31 13:41 作者: Halfhearted 時間: 2025-3-31 19:44