派博傳思國際中心

標題: Titlebook: Human Aspects of Information Security, Privacy, and Trust; 4th International Co Theo Tryfonas Conference proceedings 2016 Springer Internat [打印本頁]

作者: Filament    時間: 2025-3-21 18:58
書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)




書目名稱Human Aspects of Information Security, Privacy, and Trust影響因子(影響力)學科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust網絡公開度




書目名稱Human Aspects of Information Security, Privacy, and Trust網絡公開度學科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次




書目名稱Human Aspects of Information Security, Privacy, and Trust被引頻次學科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用




書目名稱Human Aspects of Information Security, Privacy, and Trust年度引用學科排名




書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋




書目名稱Human Aspects of Information Security, Privacy, and Trust讀者反饋學科排名





作者: Amenable    時間: 2025-3-21 23:42
Theo TryfonasIncludes supplementary material:
作者: 腐蝕    時間: 2025-3-22 03:15
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/h/image/428972.jpg
作者: Humble    時間: 2025-3-22 08:34

作者: 孵卵器    時間: 2025-3-22 11:24

作者: Ophthalmologist    時間: 2025-3-22 14:45

作者: anticipate    時間: 2025-3-22 18:56
User Identification Using Gamesfect system. In this paper we present the notion of using videogames, specifically Tetris, to supplement traditional authentication methods and provide an additional layer of identity validation. Two experiments were undertaken that required participants to play a modified version of Tetris; the fir
作者: multiply    時間: 2025-3-23 00:32

作者: micronutrients    時間: 2025-3-23 03:44
Implicit Authentication for Mobile Devices Using Typing Behaviorportion of the user’s sensitive data and communications. We propose a secondary implicit authentication scheme which monitors typing behavior to detect unauthorized use and lock down the mobile device. We build a basic implementation of our scheme on the Android operating system. Our user studies on
作者: LUDE    時間: 2025-3-23 06:11

作者: 詞匯記憶方法    時間: 2025-3-23 11:36

作者: 大雨    時間: 2025-3-23 14:07
Anonymous Authentication with a Bi-directional Identity Federation in the Cloud. In the cloud architecture, user space may be shared across various resources, leading to possible data exposure, and making mapping of users and their privileges a challenging job. Moreover the user has to keep track of many passwords and tokens for different applications. In many setting, anonymi
作者: 多嘴    時間: 2025-3-23 18:07

作者: Reservation    時間: 2025-3-24 01:01

作者: ARENA    時間: 2025-3-24 04:10
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Perthe software lifecycle, focusing on the early design phase and mitigating privacy risks. As a departure point, we used Personal Health Information Act (PHIA) in Nova Scotia to derive the following five proposed privacy patterns: 1-request an access 2-request a correction 3-request not to disclose Pe
作者: defuse    時間: 2025-3-24 08:29
Information Security Application Design: Understanding Your Usersonal methods of creating Personas are time-consuming. In this work, members of the Rapid7 User Experience team illustrate how they have quickly created Personas using the Proto-Persona method. The method, which encapsulates a collective set of beliefs that an organization has about their users, enab
作者: escalate    時間: 2025-3-24 11:14
Responsibility Modelling and Its Application Trust Managementt trust can be measured in-terms of reliability and dependability, while from a socio standpoint trust can be viewed as (a) the Need to trust, trust based on Identification, trust based on Competence and finally trust based on Evidence. In this paper we will develop a socio-technical model of trust
作者: Contracture    時間: 2025-3-24 16:16
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banksof human behaviour, based on relevant theories like deterrence theory and the theory of planned behaviour. We conduct a survey of IT professionals, managers and employees of selected banks from Nigeria as part of a sector case study focussed in this region. Our findings suggest that security by comp
作者: 急急忙忙    時間: 2025-3-24 22:37
Current Trend of End-Users’ Behaviors Towards Security Mechanismsare being rapidly modified sophisticatedly. Consequently, end-users’ behaviors are being changed, newly developed, and/or innovated as a result of the modifications of the mechanisms. Therefore, tracing the change of the end-user’s security related behaviors is an essential activity that should get
作者: 遺傳    時間: 2025-3-24 23:16

作者: 小樣他閑聊    時間: 2025-3-25 06:34

作者: Lice692    時間: 2025-3-25 10:31

作者: ACME    時間: 2025-3-25 11:42
Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective use online services which place their personal information at risk, comprising a Privacy Paradox. Previous work has analysed this phenomenon through after-the-fact comparisons, but not studied disclosure behaviour during questioning. We physically surveyed UK cities to study how the British public
作者: 星球的光亮度    時間: 2025-3-25 19:35
Oliver Buckley,Duncan Hodgesstand dieses Wissenschaftsgebietes sind damit die Gesetzm??igkeiten, die den strukturellen Aufbau und die wechselseitige Umwandlung der ungeheuren Vielfalt von Stoffen bestimmen. Die Chemie ist in erster Linie eine experimentelle Wissenschaft. Akkumuliertes Wissen, neue Anschauungen und Konzepte sin
作者: 尖酸一點    時間: 2025-3-25 21:21
Kulpreet Chilana,Federico Casalegnostand dieses Wissenschaftsgebietes sind damit die Gesetzm??igkeiten, die den strukturellen Aufbau und die wechselseitige Umwandlung der ungeheuren Vielfalt von Stoffen bestimmen. Die Chemie ist in erster Linie eine experimentelle Wissenschaft. Akkumuliertes Wissen, neue Anschauungen und Konzepte sin
作者: octogenarian    時間: 2025-3-26 00:54

作者: OPINE    時間: 2025-3-26 07:04
Tesleem Fagade,Theo Tryfonasftlich. Unendliche M?glichkeiten er?ffnen sich dabei, locken mit enormer Vielfalt, fordern uns gleichzeitig heraus, mit der Komplexit?t realer oder virtueller Welten umzugehen. Unser Bemühen, Situationen und Fakten m?glichst ganzheitlich zu erfassen, realistisch einzusch?tzen und allseits umfassend,
作者: 一個姐姐    時間: 2025-3-26 12:08
Yasser M. Hausawiftlich. Unendliche M?glichkeiten er?ffnen sich dabei, locken mit enormer Vielfalt, fordern uns gleichzeitig heraus, mit der Komplexit?t realer oder virtueller Welten umzugehen. Unser Bemühen, Situationen und Fakten m?glichst ganzheitlich zu erfassen, realistisch einzusch?tzen und allseits umfassend,
作者: 過剩    時間: 2025-3-26 14:36
Teresa Schmidt,Ralf Philipsen,Martina Zieflefachlichen, empathischen und interkulturellen Kompetenzen ist die Basis für ein Handeln im Management mit einem gutem (Bauch-)Gefühl. Empathie statt Kommando und Kontrolle. Von Führungskr?ften im Management wird angenommen, sie müssen Entscheidungen rational treffen, indem sie Informationen sammeln
作者: 揉雜    時間: 2025-3-26 18:05

作者: SEEK    時間: 2025-3-26 23:22
Andrew Blythzt wird – gerade in Zeiten von Angst und Unsicherheit..Der Inhalt.??.- Das Bauchgefühl im Spiegel der Gesellschaft: Grundlagen und aktuelle Entwicklungen.- Die Bedeutung des Bauchgefühls in der Wirtschaft.- Bau978-3-662-63667-1
作者: 嚴厲批評    時間: 2025-3-27 04:45

作者: Comprise    時間: 2025-3-27 07:22
Takashi Tsuchiya,Masahiro Fujita,Kenta Takahashi,Takehisa Kato,Fumihiko Magata,Yoshimi Teshigawara,R
作者: 我吃花盤旋    時間: 2025-3-27 11:49

作者: TAP    時間: 2025-3-27 16:13

作者: 歡樂中國    時間: 2025-3-27 19:54
Vibration Based Tangible Tokens for Intuitive Pairing Among Smart Devicesbetween the two devices is activated, when the devices sense and detect the vibration frequency of a token that was placed on their screens. For pairing, the devices use frequency information as authentication key. The proposed technique easily allows users to pair with the target device without kno
作者: cavity    時間: 2025-3-28 01:24
Responsibility Modelling and Its Application Trust Managementators. From this model we will explore the relationship between the elements of a tasks execution and the actions communication associated with a task and hence a responsibility. We will use this logical model to show how a argument of consistency can be constructed and from that a measure of trust
作者: Subjugate    時間: 2025-3-28 03:12
Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secretunintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled fr
作者: 極端的正確性    時間: 2025-3-28 07:15

作者: 縮短    時間: 2025-3-28 13:22
Oliver Buckley,Duncan Hodgesgie, Geologie und Mineralogie eng verknüpft und eine strenge Abgrenzung des Aufgabengebiets der Chemie von dem der übrigen naturwissenschaftlichen Disziplinen ist weder sinnvoll noch notwendig. Ziel der chemischen Forschung ist die Synthese von Substanzen mit v?llig neuen Eigenschaften. Damit ist di
作者: Graduated    時間: 2025-3-28 18:16

作者: FLASK    時間: 2025-3-28 20:01

作者: 大炮    時間: 2025-3-28 23:46
Yasser M. Hausawiermeiden wir Irrwege und wie treten wir Irrglauben entgegen? Wie treffen wir richtige Entscheidungen? Der Beitrag von Felicitas Birkner zeigt, dass Zukunft Pers?nlichkeit braucht und die Nutzung aller Potenziale fordert: in Balance – aus der Mitte – Impulse von innen.
作者: 清楚    時間: 2025-3-29 03:44

作者: 和平主義者    時間: 2025-3-29 07:53

作者: HAIRY    時間: 2025-3-29 15:24
Human Aspects of Information Security, Privacy, and Trust4th International Co
作者: fertilizer    時間: 2025-3-29 15:52
Anonymous Authentication with a Bi-directional Identity Federation in the Cloudted identity management scheme that allows for anonymous authentication of users. Our proposed scheme is applicable to any combination of horizontal and vertical federations, across multiple cloud layers.
作者: 水汽    時間: 2025-3-29 22:28

作者: BAN    時間: 2025-3-30 03:07

作者: Cholesterol    時間: 2025-3-30 04:07
Security by Compliance? A Study of Insider Threat Implications for Nigerian Banksgulators should promote holistic change of security culture across the sector. Based on an established model of Information Security Governance Framework, we propose how information security may be embedded into organisation security culture in that context.
作者: 皺痕    時間: 2025-3-30 10:01

作者: cardiopulmonary    時間: 2025-3-30 16:25
Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Perrsonal Health Information 4-being notified if the PHI is lost, stolen or subject to unauthorized access 5-request a review. The patterns provide a guide to designers and developers in designing privacy-preserving systems in healthcare.
作者: 廣大    時間: 2025-3-30 20:00
Information Security Application Design: Understanding Your Usersled our organization to capture stories of 80 characters. Refining these during the process, resulted in 16 Proto-Personas, which were visualized within a Persona Ecosystem. This Ecosystem, and the Personas within, has allowed Rapid7 to design the right Information Security applications for the right users at the right time.
作者: 我不怕犧牲    時間: 2025-3-30 20:44

作者: antidepressant    時間: 2025-3-31 04:20
Conference proceedings 2016Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas..The 25 papers presented in the HAS 2016 proceedings are organized in topical sections as follows: human factors of authentication; security, privacy, and human behavior; and security technologies.
作者: 遠地點    時間: 2025-3-31 08:56

作者: 鑲嵌細工    時間: 2025-3-31 13:11
Hermes: Hands-Free Authentication in Physical Spaces show a considerable improvement in the time required to authenticate via Hermes, as opposed to traditional authentication methods. We also evaluate the accuracy of Bluetooth LE for use in such a system.
作者: Mumble    時間: 2025-3-31 13:41

作者: Halfhearted    時間: 2025-3-31 19:44





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
河源市| 隆尧县| 外汇| 达日县| 云龙县| 邵武市| 白城市| 绥江县| 嘉定区| 赤壁市| 阳谷县| 墨竹工卡县| 定西市| 石景山区| 龙口市| 屯留县| 手游| 玛多县| 平乐县| 尤溪县| 天津市| 衡阳市| 南阳市| 清河县| 齐河县| 漠河县| 易门县| 许昌县| 西城区| 鱼台县| 静海县| 上饶县| 南充市| 澎湖县| 和林格尔县| 余庆县| 称多县| 民丰县| 屯门区| 桓仁| 吕梁市|