Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA /: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. (2018)
- Record Type:
- Book
- Title:
- Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA /: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA. (2018)
- Main Title:
- Advances in Human Factors in Cybersecurity : Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21-25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA
- Other Titles:
- AHFE 2018
- Further Information:
- Note: Tareq Z. Ahram, Denise NIcholson, editors.
- Editors:
- Ahram, Tareq Z
Nicholson, Denise, 1967- - Other Names:
- International Conference on Human Factors in Cybersecurity
- Contents:
- Intro; Advances in Human Factors and Ergonomics 2018; Preface; Contents; Cybersecurity Tools and Analytics; A Simulation-Based Approach to Development of a New Insider Threat Detection Technique: Active Indicators; Abstract; 1 Introduction; 1.1 The Insider Threat; 1.2 Deception; 1.3 Active Indicator Probes (AIP); 1.4 Detection of Response to AIP; 1.5 Goal; 2 Simulation; 2.1 Necessity; 2.2 Role Induction and Immersion; 2.3 Summary of Eye Gaze Strategy; 2.4 Implementation; 3 Method; 3.1 Participants; 3.2 Apparatus; 3.3 Eye Tracking Metrics; 3.4 Financial Simulation; 3.5 Procedure; 4 Results 5 Discussion5.1 Limitations; 5.2 Future Work; Acknowledgements; References; Biometric Electronic Signature Security; Abstract; 1 Introduction; 1.1 Protocols; 2 Biometric Electronic Signatures; 2.1 Standardization; 3 Biometric Intention and Acceptance; 3.1 Abstract Schema; 4 Conclusion; References; Convenience or Strength? Aiding Optimal Strategies in Password Generation; Abstract; 1 Introduction; 2 Related Work; 3 Study; 4 Results and Discussion; 5 Conclusion; References; A Metric to Assess Cyberattacks; Abstract; 1 Introduction; 2 Defining a Cybersecurity Metric 3 The Attacker/Defender Scenario4 RSA: An Interesting Example; 5 Creating the RSA Public-Key Cryptosystem; 6 Attack/Defense Scenarios; 7 Conclusion; References; Measuring Application Security; Abstract; 1 Introduction; 2 Methodology; 2.1 Literature Review; 2.2 Interviews; 3 Observations; 3.1 Types of Organizations; 3.2 PersonnelIntro; Advances in Human Factors and Ergonomics 2018; Preface; Contents; Cybersecurity Tools and Analytics; A Simulation-Based Approach to Development of a New Insider Threat Detection Technique: Active Indicators; Abstract; 1 Introduction; 1.1 The Insider Threat; 1.2 Deception; 1.3 Active Indicator Probes (AIP); 1.4 Detection of Response to AIP; 1.5 Goal; 2 Simulation; 2.1 Necessity; 2.2 Role Induction and Immersion; 2.3 Summary of Eye Gaze Strategy; 2.4 Implementation; 3 Method; 3.1 Participants; 3.2 Apparatus; 3.3 Eye Tracking Metrics; 3.4 Financial Simulation; 3.5 Procedure; 4 Results 5 Discussion5.1 Limitations; 5.2 Future Work; Acknowledgements; References; Biometric Electronic Signature Security; Abstract; 1 Introduction; 1.1 Protocols; 2 Biometric Electronic Signatures; 2.1 Standardization; 3 Biometric Intention and Acceptance; 3.1 Abstract Schema; 4 Conclusion; References; Convenience or Strength? Aiding Optimal Strategies in Password Generation; Abstract; 1 Introduction; 2 Related Work; 3 Study; 4 Results and Discussion; 5 Conclusion; References; A Metric to Assess Cyberattacks; Abstract; 1 Introduction; 2 Defining a Cybersecurity Metric 3 The Attacker/Defender Scenario4 RSA: An Interesting Example; 5 Creating the RSA Public-Key Cryptosystem; 6 Attack/Defense Scenarios; 7 Conclusion; References; Measuring Application Security; Abstract; 1 Introduction; 2 Methodology; 2.1 Literature Review; 2.2 Interviews; 3 Observations; 3.1 Types of Organizations; 3.2 Personnel Roles; 3.3 Application Security Boundaries; 3.4 Goals, Questions, Metrics, and Tools; Acknowledgements; References; Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions; Abstract; 1 Introduction; 2 Method; 3 Results and Discussion 4 Limitations5 Implications; Acknowledgments; References; A Game-Theoretical Model of Ransomware; Abstract; 1 Introduction; 2 Related Work; 3 A Game-Theoretical Model; 3.1 Characteristics of the Game; 3.2 Real-Life Decision Making; 3.3 Amount Renegotiation; 4 Conclusion; References; Cyber Security Awareness Among College Students; Abstract; 1 Introduction; 2 Method; 3 Results; 3.1 Knowledge of Cyber Security; 3.2 Privacy; 3.3 Trust; 3.4 Trust of University Data Security; 3.5 Password; 4 Data Analysis; 4.1 Knowledge of Cyber Security; 4.2 Password; 4.3 Privacy; 4.4 Trust; 5 Conclusion … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 006.3
Engineering
Management information systems -- Congresses
Computer security -- Congresses
User interfaces (Computer systems) -- Congresses
Computational intelligence -- Congresses
Computer crimes -- Congresses
Engineering -- Congresses
COMPUTERS / General
Computational intelligence
Computer crimes
Computer security
Engineering
Management information systems
User interfaces (Computer systems)
Computers -- Security -- General
Computers -- User Interfaces
Computers -- Enterprise Applications -- General
Social Science -- Criminology
Computer security
User interface design & usability
Business mathematics & systems
Crime & criminology
Computer security
Computer science
Management information systems
Computer crimes
Computers -- Intelligence (AI) & Semantics
Artificial intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319947822
3319947826 - Related ISBNs:
- 9783319947815
- Notes:
- Note: Online resource; title from PDF file page (EBSCO, viewed June 27, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367792
- Ingest File:
- 01_344.xml