Human Aspects of Information Security, Privacy, and Trust (Record no. 96571)

000 -LEADER
fixed length control field 06783nam a22006375i 4500
001 - CONTROL NUMBER
control field 978-3-319-07620-1
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730201519.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140607s2014 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319076201
-- 978-3-319-07620-1
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-07620-1
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA75.5-76.95
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYA
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM014000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYA
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.0151
Edition number 23
245 10 - TITLE STATEMENT
Title Human Aspects of Information Security, Privacy, and Trust
Medium [electronic resource] :
Remainder of title Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings /
Statement of responsibility, etc. edited by Theo Tryfonas, Ioannis Askoxylakis.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2014.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent XXII, 448 p. 129 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume/sequential designation 8533
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Usable Security -- On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security -- A Network Telescope for Early Warning Intrusion Detection -- Visualization of System Log Files for Post-incident Analysis and Response -- An Assessment Framework for Usable-Security Based on Decision Science -- On Designing Usable Policy Languages for Declarative Trust Aggregation -- An Image-Based CAPTCHA Using Sophisticated Mental Rotation -- What Usable Security Really Means: Trusting and Engaging Users -- QR Code Security: A Survey of Attacks and Challenges for Usable Security -- Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India -- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security -- Authentication and Passwords Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method -- A Cognitive-Behavioral Framework of User Password Management Lifecycle -- Do Graphical Authentication Systems Solve the Password Memorability Problem -- E-voting Authentication with QR-codes -- I Can't Type That! P@$$w0rd Entry on Mobile Devices -- Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention -- ACCESS: Describing and Contrasting - Authentication Mechanisms -- Character Strings, Memory and Passwords: What a Recall Study Can Tell Us -- Security Policy and Awareness -- From Regulations to Practice: Achieving Information Security Compliance in Healthcare -- Rethinking the Smart Card Technology -- Compositional Security Modelling: Structure, Economics, and Behaviour -- End User Development and Information Security Culture -- DSAPE - Dynamic Security Awareness Program Evaluation -- A Critical Reflection on the Threat from Human Insiders - Its Nature, Industry Perceptions, and Detection Approaches -- Changing Faces: Identifying Complex Behavioural Profiles -- Human Behaviour in Cybersecurity -- A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations -- Socio-technical Security Analysis of Wireless Hotspots -- A Conceptual Framework to Study Socio-Technical Security -- An Evaluation of Behavioural Profiling on Mobile Devices -- Nudging for Quantitative Access Control Systems -- Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior -- The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role of Security Culture -- Privacy Issues -- User Acceptance of Privacy-ABCs: An Exploratory Study -- "My Life Doesn't Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites -- Paper Audit Trails and Voters' Privacy Concerns -- Mental Models for Usable Privacy: A Position Paper -- Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users -- Privacy Protection Based Privacy ConflictDetection and Solution in Online Social Networks.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer science.
9 (RLIN) 9832
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element User interfaces (Computer systems).
9 (RLIN) 11681
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Human-computer interaction.
9 (RLIN) 6196
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
General subdivision Management.
9 (RLIN) 167491
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information storage and retrieval systems.
9 (RLIN) 22213
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
9 (RLIN) 167492
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Models of Computation.
9 (RLIN) 31806
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element User Interfaces and Human Computer Interaction.
9 (RLIN) 31632
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IT Operations.
9 (RLIN) 31703
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information Storage and Retrieval.
9 (RLIN) 23927
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer and Information Systems Applications.
9 (RLIN) 167493
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tryfonas, Theo.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 167494
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Askoxylakis, Ioannis.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 167495
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 167496
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319076195
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319076218
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume/sequential designation 8533
9 (RLIN) 167497
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-319-07620-1">https://doi.org/10.1007/978-3-319-07620-1</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.