Skip to main content
  • Conference proceedings
  • © 2014

Human Aspects of Information Security, Privacy, and Trust

Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings

Conference proceedings info: HAS 2014.

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-07620-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (38 papers)

  1. Front Matter

  2. Usable Security

    1. Front Matter

      Pages 1-1
    2. On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security

      • Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras
      Pages 3-10Open Access
    3. A Network Telescope for Early Warning Intrusion Detection

      • Panos Chatziadam, Ioannis G. Askoxylakis, Alexandros Fragkiadakis
      Pages 11-22Open Access
    4. Visualization of System Log Files for Post-incident Analysis and Response

      • John Haggerty, Thomas Hughes-Roberts
      Pages 23-32Open Access
    5. An Assessment Framework for Usable-Security Based on Decision Science

      • Yasser M. Hausawi, William H. Allen
      Pages 33-44Open Access
    6. On Designing Usable Policy Languages for Declarative Trust Aggregation

      • Michael Huth, Jim Huan-Pu Kuo
      Pages 45-56Open Access
    7. An Image-Based CAPTCHA Using Sophisticated Mental Rotation

      • Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki
      Pages 57-68Open Access
    8. What Usable Security Really Means: Trusting and Engaging Users

      • Iacovos Kirlappos, M. Angela Sasse
      Pages 69-78Open Access
    9. QR Code Security: A Survey of Attacks and Challenges for Usable Security

      • Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar Weippl
      Pages 79-90Open Access
    10. Discrete Hardware Apparatus and Method for Mobile Application and Communication Security

      • Paschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis
      Pages 102-112Open Access
  3. Authentication and Passwords

    1. Front Matter

      Pages 113-113
    2. Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method

      • Panagiotis Andriotis, Theo Tryfonas, George Oikonomou
      Pages 115-126Open Access
    3. Do Graphical Authentication Systems Solve the Password Memorability Problem?

      • Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
      Pages 138-148Open Access
    4. E-voting Authentication with QR-codes

      • Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar Weippl
      Pages 149-159Open Access
    5. I Can’t Type That! P@$$w0rd Entry on Mobile Devices

      • Kristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee
      Pages 160-171Open Access
    6. Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention

      • Nina Kolb, Steffen Bartsch, Melanie Volkamer, Joachim Vogt
      Pages 172-182Open Access
    7. ACCESS: Describing and Contrasting

      • Karen Renaud, Melanie Volkamer, Joseph Maguire
      Pages 183-194Open Access

Other Volumes

  1. Human Aspects of Information Security, Privacy, and Trust

    Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings

About this book

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Keywords

  • HCI
  • authentication
  • cybersecurity
  • human behavior
  • human centered computing
  • human computer interaction
  • human factors
  • information security
  • information systems
  • mobile devices
  • privacy
  • social computing
  • usable security
  • user behavior

Editors and Affiliations

  • Cryptography Group, University of Bristol, Bristol, UK

    Theo Tryfonas

  • Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Heraklion, Greece

    Ioannis Askoxylakis

Bibliographic Information

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-07620-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)