000 | 03477nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-39345-7 | ||
003 | DE-He213 | ||
005 | 20200421111654.0 | ||
007 | cr nn 008mamaa | ||
008 | 130703s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642393457 _9978-3-642-39345-7 |
||
024 | 7 |
_a10.1007/978-3-642-39345-7 _2doi |
|
050 | 4 | _aQA76.9.U83 | |
050 | 4 | _aQA76.9.H85 | |
072 | 7 |
_aUYZG _2bicssc |
|
072 | 7 |
_aCOM070000 _2bisacsh |
|
082 | 0 | 4 |
_a005.437 _223 |
082 | 0 | 4 |
_a4.019 _223 |
245 | 1 | 0 |
_aHuman Aspects of Information Security, Privacy, and Trust _h[electronic resource] : _bFirst International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings / _cedited by Louis Marinos, Ioannis Askoxylakis. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXX, 378 p. 102 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8030 |
|
505 | 0 | _aNovel authentication systems -- Human factors in security -- Security and privacy policies -- User centric security and privacy. | |
520 | _aThis book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aInformation storage and retrieval. | |
650 | 0 | _aUser interfaces (Computer systems). | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aE-commerce. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aUser Interfaces and Human Computer Interaction. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _ae-Commerce/e-business. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer Applications. |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
700 | 1 |
_aMarinos, Louis. _eeditor. |
|
700 | 1 |
_aAskoxylakis, Ioannis. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642393440 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8030 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-39345-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c54567 _d54567 |