Listing 1 - 10 of 54 | << page >> |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.
Computer science. --- Computer security. --- Data encryption (Computer science). --- User Interfaces and Human Computer Interaction. --- Systems and Data Security. --- Security Services. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Computing Milieux. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Human-computer interaction --- User interfaces (Computer systems). --- Application software. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Interfaces, User (Computer systems) --- Human-machine systems --- User interfaces (Computer systems) --- Data encryption (Computer science)
Choose an application
This book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. HCI-CPT 2020 includes a total of 45 regular papers; they were organized in topical sections named: human factors in cybersecurity; privacy and trust; usable security approaches. As a result of the Danish Government's announcement, dated April21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually. .
User interfaces (Computer systems). --- Computer networks --- Computer security. --- Data encryption (Computer science). --- Computer communication systems. --- Coding theory. --- Information theory. --- User Interfaces and Human Computer Interaction. --- Mobile and Network Security. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Coding and Information Theory. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Security measures. --- Distributed processing --- Protection --- Security measures --- Data encryption (Computer science) --- User interfaces (Computer systems) --- Computer networks.
Choose an application
Choose an application
Computer security. --- Computer security --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Seguretat informàtica --- Xifratge (Informàtica)
Choose an application
This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.
User interfaces (Computer systems). --- Human-computer interaction. --- Coding theory. --- Information theory. --- Computers—Law and legislation. --- Information technology—Law and legislation. --- Computer networks. --- Electronic commerce. --- Software engineering. --- User Interfaces and Human Computer Interaction. --- Coding and Information Theory. --- Legal Aspects of Computing. --- Computer Communication Networks. --- e-Commerce and e-Business. --- Software Engineering. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer software engineering --- Engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer security --- Data encryption (Computer science)
Choose an application
"This book is intended to help all professionals new to cybersecurity, students, and experts to use the content to learn or educate their audiences on the foundations of the solutions already offered"--
Computer networks --- Computer security. --- Security measures. --- Computer --- Networks --- Software
Choose an application
Cyber security, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cyber security focus on, both from a human computer interaction point of view, and human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.
Computer networks --- Computer crimes --- Computer security --- Security measures --- Prevention
Choose an application
Globalization --- Arab countries --- Economic conditions --- Foreign economic relations.
Choose an application
"In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection"--
Computer security. --- Computer networks --- Universities and colleges --- Security measures.
Choose an application
Ethical Decision Quality: Building an Ethical Decision Culture by Ali E. Abbas delves into the complexities of making ethical decisions within organizations. The book outlines the elements that contribute to ethical decision quality and highlights common impediments that organizations face. Using an extensive compilation of literature, case studies, and media sources, Abbas illustrates the challenges posed by cognitive biases, risk tolerance, and legal versus ethical considerations. The book aims to provide a framework for assessing and improving the ethical quality of decisions, emphasizing the integration of ethics into decision-making processes. It is intended for professionals and academics interested in ethics, decision analysis, and organizational culture.
Decision making --- Business ethics. --- Moral and ethical aspects. --- Business ethics --- Moral and ethical aspects --- E-books
Listing 1 - 10 of 54 | << page >> |
Sort by
|