Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
29
views
0
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,440
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Human Aspects of Information Security, Privacy, and Trust
other
Editor(s):
Theo Tryfonas
,
Ioannis Askoxylakis
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Author and book information
Book
ISBN (Print):
978-3-319-07619-5
ISBN (Electronic):
978-3-319-07620-1
Publication date (Print):
2014
DOI:
10.1007/978-3-319-07620-1
SO-VID:
6751f142-2932-4506-8dc2-26f9eef54d7f
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security
pp. 11
A Network Telescope for Early Warning Intrusion Detection
pp. 23
Visualization of System Log Files for Post-incident Analysis and Response
pp. 33
An Assessment Framework for Usable-Security Based on Decision Science
pp. 45
On Designing Usable Policy Languages for Declarative Trust Aggregation
pp. 57
An Image-Based CAPTCHA Using Sophisticated Mental Rotation
pp. 69
What Usable Security Really Means: Trusting and Engaging Users
pp. 79
QR Code Security: A Survey of Attacks and Challenges for Usable Security
pp. 91
Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India
pp. 102
Discrete Hardware Apparatus and Method for Mobile Application and Communication Security
pp. 115
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method
pp. 127
A Cognitive-Behavioral Framework of User Password Management Lifecycle
pp. 138
Do Graphical Authentication Systems Solve the Password Memorability Problem?
pp. 149
E-voting Authentication with QR-codes
pp. 160
I Can’t Type That! P@$$w0rd Entry on Mobile Devices
pp. 172
Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention
pp. 183
ACCESS: Describing and Contrasting
pp. 195
Character Strings, Memory and Passwords: What a Recall Study Can Tell Us
pp. 209
From Regulations to Practice: Achieving Information Security Compliance in Healthcare
pp. 221
Rethinking the Smart Card Technology
pp. 233
Compositional Security Modelling
pp. 246
End User Development and Information Security Culture
pp. 258
DSAPE – Dynamic Security Awareness Program Evaluation
pp. 270
A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches
pp. 282
Changing Faces: Identifying Complex Behavioural Profiles
pp. 297
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations
pp. 306
Socio-technical Security Analysis of Wireless Hotspots
pp. 318
A Conceptual Framework to Study Socio-Technical Security
pp. 330
An Evaluation of Behavioural Profiling on Mobile Devices
pp. 340
Nudging for Quantitative Access Control Systems
pp. 352
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior
pp. 361
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture
pp. 375
User Acceptance of Privacy-ABCs: An Exploratory Study
pp. 387
"My Life Doesn’t Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites
pp. 400
Paper Audit Trails and Voters’ Privacy Concerns
pp. 410
Mental Models for Usable Privacy: A Position Paper
pp. 422
Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users?
pp. 433
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Similar content
2,440
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
Authors:
Josep Domingo-Ferrer
,
Bo Qin
,
Qianhong Wu
…
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Authors:
R White
,
G. Caiazza
,
C Jiang
…
A Comprehensive Survey on Security and Privacy for Electronic Health Data
Authors:
Se-Ra Oh
,
Young-Duk Seo
,
Euijong Lee
…
See all similar
Cited by
1
How to Make Privacy Policies both GDPR-Compliant and Usable
Authors:
Lynsay A. Shepherd
,
Karen Renaud
See all cited by