Advertisement

Human Aspects of Information Security, Privacy, and Trust

Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings

  • Theo Tryfonas
  • Ioannis Askoxylakis

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)

Table of contents

  1. Front Matter
  2. Usable Security

    1. Front Matter
      Pages 1-1
    2. Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras
      Pages 3-10
    3. Panos Chatziadam, Ioannis G. Askoxylakis, Alexandros Fragkiadakis
      Pages 11-22
    4. John Haggerty, Thomas Hughes-Roberts
      Pages 23-32
    5. Yasser M. Hausawi, William H. Allen
      Pages 33-44
    6. Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki
      Pages 57-68
    7. Iacovos Kirlappos, M. Angela Sasse
      Pages 69-78
    8. Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar Weippl
      Pages 79-90
    9. Paschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis
      Pages 102-112
  3. Authentication and Passwords

    1. Front Matter
      Pages 113-113
    2. Panagiotis Andriotis, Theo Tryfonas, George Oikonomou
      Pages 115-126
    3. Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
      Pages 138-148
    4. Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar Weippl
      Pages 149-159
    5. Kristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee
      Pages 160-171
    6. Karen Renaud, Melanie Volkamer, Joseph Maguire
      Pages 183-194
    7. Brian C. Stanton, Kristen K. Greene
      Pages 195-206
  4. Security Policy and Awareness

    1. Front Matter
      Pages 207-207
    2. Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller
      Pages 209-220
    3. Raja Naeem Akram, Konstantinos Markantonakis
      Pages 221-232
    4. Tristan Caulfield, David Pym, Julian Williams
      Pages 233-245
    5. Fredrik Karlsson, Karin Hedström
      Pages 246-257
    6. Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis
      Pages 258-269
    7. Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon Wright, Monica Whitty et al.
      Pages 270-281
    8. Giles Oatley, Tom Crick
      Pages 282-293
  5. Human Behaviour in Cybersecurity

    1. Front Matter
      Pages 295-295
    2. Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini
      Pages 306-317
    3. Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini
      Pages 318-329
    4. Fudong Li, Ross Wheeler, Nathan Clarke
      Pages 330-339
    5. Charles Morisset, Thomas Groß, Aad van Moorsel, Iryna Yevseyeva
      Pages 340-351
    6. Mariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh et al.
      Pages 352-360
  6. Privacy Issues

    1. Front Matter
      Pages 373-373
    2. Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis Stamatiou
      Pages 375-386
    3. Jurlind Budurushi, Simon Stockhardt, Marcel Woide, Melanie Volkamer
      Pages 400-409
    4. Kovila P. L. Coopamootoo, Thomas Groß
      Pages 410-421
  7. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Keywords

HCI authentication cybersecurity human behavior human centered computing human computer interaction human factors information security information systems mobile devices privacy social computing usable security user behavior

Editors and affiliations

  • Theo Tryfonas
    • 1
  • Ioannis Askoxylakis
    • 2
  1. 1.Cryptography GroupUniversity of BristolBristolUK
  2. 2.Institute of Computer ScienceFoundation for Research and Technology - Hellas (FORTH)HeraklionGreece

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-07620-1
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-07619-5
  • Online ISBN 978-3-319-07620-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site