Human Aspects of Information Security, Privacy, and Trust

Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings

Editors:

ISBN: 978-3-319-07619-5 (Print) 978-3-319-07620-1 (Online)

Table of contents (38 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Usable Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-10

      On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security

    3. No Access

      Book Chapter

      Pages 11-22

      A Network Telescope for Early Warning Intrusion Detection

    4. No Access

      Book Chapter

      Pages 23-32

      Visualization of System Log Files for Post-incident Analysis and Response

    5. No Access

      Book Chapter

      Pages 33-44

      An Assessment Framework for Usable-Security Based on Decision Science

    6. No Access

      Book Chapter

      Pages 45-56

      On Designing Usable Policy Languages for Declarative Trust Aggregation

    7. No Access

      Book Chapter

      Pages 57-68

      An Image-Based CAPTCHA Using Sophisticated Mental Rotation

    8. No Access

      Book Chapter

      Pages 69-78

      What Usable Security Really Means: Trusting and Engaging Users

    9. No Access

      Book Chapter

      Pages 79-90

      QR Code Security: A Survey of Attacks and Challenges for Usable Security

    10. No Access

      Book Chapter

      Pages 91-101

      Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India

    11. No Access

      Book Chapter

      Pages 102-112

      Discrete Hardware Apparatus and Method for Mobile Application and Communication Security

  3. Authentication and Passwords

    1. Front Matter

      Pages 113-113

    2. No Access

      Book Chapter

      Pages 115-126

      Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method

    3. No Access

      Book Chapter

      Pages 127-137

      A Cognitive-Behavioral Framework of User Password Management Lifecycle

    4. No Access

      Book Chapter

      Pages 138-148

      Do Graphical Authentication Systems Solve the Password Memorability Problem?

    5. No Access

      Book Chapter

      Pages 149-159

      E-voting Authentication with QR-codes

    6. No Access

      Book Chapter

      Pages 160-171

      I Can’t Type That! P@$$w0rd Entry on Mobile Devices

    7. No Access

      Book Chapter

      Pages 172-182

      Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention

    8. No Access

      Book Chapter

      Pages 183-194

      ACCESS: Describing and Contrasting

    9. No Access

      Book Chapter

      Pages 195-206

      Character Strings, Memory and Passwords: What a Recall Study Can Tell Us

  4. Security Policy and Awareness

    1. Front Matter

      Pages 207-207

    2. No Access

      Book Chapter

      Pages 209-220

      From Regulations to Practice: Achieving Information Security Compliance in Healthcare

    3. No Access

      Book Chapter

      Pages 221-232

      Rethinking the Smart Card Technology

previous Page of 2