Human Aspects of Information Security, Privacy, and Trust

Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings

  • Theo Tryfonas
  • Ioannis Askoxylakis
Conference proceedings HAS 2014

DOI: 10.1007/978-3-319-07620-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)

Table of contents (38 papers)

  1. Front Matter
  2. Usable Security

    1. Front Matter
      Pages 1-1
    2. Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras
      Pages 3-10
    3. Panos Chatziadam, Ioannis G. Askoxylakis, Alexandros Fragkiadakis
      Pages 11-22
    4. John Haggerty, Thomas Hughes-Roberts
      Pages 23-32
    5. Yasser M. Hausawi, William H. Allen
      Pages 33-44
    6. Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki
      Pages 57-68
    7. Iacovos Kirlappos, M. Angela Sasse
      Pages 69-78
    8. Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar Weippl
      Pages 79-90
    9. Paschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis
      Pages 102-112
  3. Authentication and Passwords

    1. Front Matter
      Pages 113-113
    2. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou
      Pages 115-126
    3. Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
      Pages 138-148
    4. Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar Weippl
      Pages 149-159
    5. Kristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee
      Pages 160-171
    6. Karen Renaud, Melanie Volkamer, Joseph Maguire
      Pages 183-194

About these proceedings

Introduction

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Keywords

HCI authentication cybersecurity human behavior human centered computing human computer interaction human factors information security information systems mobile devices privacy social computing usable security user behavior

Editors and affiliations

  • Theo Tryfonas
    • 1
  • Ioannis Askoxylakis
    • 2
  1. 1.Cryptography GroupUniversity of BristolBristolUK
  2. 2.Institute of Computer ScienceFoundation for Research and Technology - Hellas (FORTH)HeraklionGreece

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-07619-5
  • Online ISBN 978-3-319-07620-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349