Narrow your search
Listing 1 - 10 of 54 << page
of 6
>>
Sort by

Book
HCI for Cybersecurity, Privacy and Trust : First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings
Author:
ISBN: 3030223507 3030223515 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.


Book
HCI for Cybersecurity, Privacy and Trust : Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings
Author:
ISBN: 3030503097 3030503089 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. HCI-CPT 2020 includes a total of 45 regular papers; they were organized in topical sections named: human factors in cybersecurity; privacy and trust; usable security approaches. As a result of the Danish Government's announcement, dated April21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually. .

Keywords

User interfaces (Computer systems). --- Computer networks --- Computer security. --- Data encryption (Computer science). --- Computer communication systems. --- Coding theory. --- Information theory. --- User Interfaces and Human Computer Interaction. --- Mobile and Network Security. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Coding and Information Theory. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Security measures. --- Distributed processing --- Protection --- Security measures --- Data encryption (Computer science) --- User interfaces (Computer systems) --- Computer networks.


Book
HCI for cybersecurity, privacy and trust : third International Conference, HCI-CPT 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29, 2021, proceedings
Author:
ISBN: 3030773922 3030773914 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
HCI for cybersecurity, privacy and trust : 4th International Conference, HCI-CPT 2022 held as part of the 24th HCI International Conference, HCII 2022, Virtual event, June 26-July 1, 2022 proceedings
Author:
ISBN: 3031055632 3031055624 Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
HCI for Cybersecurity, Privacy and Trust : 5th International Conference, HCI-CPT 2023, Held As Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings
Author:
ISBN: 3031358228 303135821X Year: 2023 Publisher: Cham, Switzerland : Springer Nature Switzerland AG,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.

Keywords

User interfaces (Computer systems). --- Human-computer interaction. --- Coding theory. --- Information theory. --- Computers—Law and legislation. --- Information technology—Law and legislation. --- Computer networks. --- Electronic commerce. --- Software engineering. --- User Interfaces and Human Computer Interaction. --- Coding and Information Theory. --- Legal Aspects of Computing. --- Computer Communication Networks. --- e-Commerce and e-Business. --- Software Engineering. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer software engineering --- Engineering --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Computer security --- Data encryption (Computer science)


Book
Understanding cybersecurity technologies : a guide to selecting the right cybersecurity tools
Author:
ISBN: 1003038425 1000506150 1000506177 1003038425 Year: 2022 Publisher: Boca Raton, Florida ; Abingdon, Oxon : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This book is intended to help all professionals new to cybersecurity, students, and experts to use the content to learn or educate their audiences on the foundations of the solutions already offered"--


Book
Human-Computer Interaction and Cybersecurity Handbook
Author:
ISBN: 1351730770 1351730762 1315184311 Year: 2018 Publisher: Boca Raton, FL : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber security, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cyber security focus on, both from a human computer interaction point of view, and human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.


Book
Les économies du Monde Arabe Dans la Globalisation : Intégration et Fragmentation.
Author:
ISBN: 2140170059 9782140170058 Year: 2021 Publisher: Paris : Campus Ouvert,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cybersecurity awareness among students and faculty
Author:
ISBN: 9780429031908 0429031904 9780429628580 0429628587 9780429625305 0429625308 9780429626944 0429626940 Year: 2019 Publisher: Boca Raton, FL : CRC Press/Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection"--


Book
Ethical Decision Quality : Building an Ethical Decision Culture.
Author:
ISBN: 180441221X 9781804412213 Year: 2023 Publisher: Ethics Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ethical Decision Quality: Building an Ethical Decision Culture by Ali E. Abbas delves into the complexities of making ethical decisions within organizations. The book outlines the elements that contribute to ethical decision quality and highlights common impediments that organizations face. Using an extensive compilation of literature, case studies, and media sources, Abbas illustrates the challenges posed by cognitive biases, risk tolerance, and legal versus ethical considerations. The book aims to provide a framework for assessing and improving the ethical quality of decisions, emphasizing the integration of ethics into decision-making processes. It is intended for professionals and academics interested in ethics, decision analysis, and organizational culture.

Listing 1 - 10 of 54 << page
of 6
>>
Sort by