Human aspects of information security, privacy, and trust : 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016. Proceedings /: 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016. Proceedings. (2016)
- Record Type:
- Book
- Title:
- Human aspects of information security, privacy, and trust : 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016. Proceedings /: 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016. Proceedings. (2016)
- Main Title:
- Human aspects of information security, privacy, and trust : 4th international conference, HAS 2016, held as part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016. Proceedings
- Other Titles:
- HAS 2016
- Further Information:
- Note: Theo Tryfonas (eds.).
- Editors:
- Tryfonas, Theodore
- Other Names:
- HAS (Conference), 4th
International Conference on Human-Computer Interaction, 18th - Contents:
- User Identification Using Games -- Hermes: Hands-Free Authentication in Physical Spaces -- Implicit Authentication for Mobile Devices Using Typing Behavior -- Fraud Protection for Online Banking -- A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials -- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices -- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud -- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011 -- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks -- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia?s Personal Health Information Act -- Information Security Application Design: Understanding Your Users -- Responsibility Modelling and Its Application Trust Management -- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks -- Current Trend of End-users? Behaviors towards Security Mechanisms -- Share to Protect -- Quantitative Study on Privacy Issues in V2X-Technology -- The Impact of Security Cues on User Perceived Security in E-Commerce -- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks -- Optional Data Disclosure and the Online Privacy Paradox: A UKUser Identification Using Games -- Hermes: Hands-Free Authentication in Physical Spaces -- Implicit Authentication for Mobile Devices Using Typing Behavior -- Fraud Protection for Online Banking -- A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials -- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices -- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud -- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011 -- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks -- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia?s Personal Health Information Act -- Information Security Application Design: Understanding Your Users -- Responsibility Modelling and Its Application Trust Management -- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks -- Current Trend of End-users? Behaviors towards Security Mechanisms -- Share to Protect -- Quantitative Study on Privacy Issues in V2X-Technology -- The Impact of Security Cues on User Perceived Security in E-Commerce -- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks -- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective -- Assessing the Feasibility of Adaptive Security Models for the Internet of Things -- OpenStack Firewall as a Service Rule Analyser -- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes -- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle -- The State of Near-Field Communication (NFC) on the Android platform -- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home -- A Taxonomy to Classify Risk End-user Profile in Interaction with the Computing Environment -- Security Middleware Programming Using P4. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xv, 289 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Access control -- Congresses
Computer networks -- Access control
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Computers -- Security -- General
Computers -- User Interfaces
Business & Economics -- Information Management
Computers -- System Administration -- Storage & Retrieval
Computers -- Information Technology
Computer security
User interface design & usability
Information architecture
Information retrieval
Computer security
Information Systems
Information storage and retrieva
Computers -- Online Services -- General
Computer science
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319393810
3319393812 - Related ISBNs:
- 9783319393803
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed July 7, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.363144
- Ingest File:
- 01_329.xml