Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
15
views
4
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,573
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Human Aspects of Information Security, Privacy, and Trust
Profit-Maximizing Trustworthiness Level of Composite Systems
other
Author(s):
Costas Kalogiros
,
Michalis Kanakakis
,
Shenja van der Graaf
,
Wim Vanobberghen
Publication date
(Online):
July 21 2015
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Most cited references
4
Record
: found
Abstract
: not found
Article
: not found
Optimal System Allocations with Penalty Costs
C Derman
,
G. Lieberman
,
S. ROSS
…
(1976)
0
comments
Cited
5
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems
Nazila Gol Mohammadi
,
Sachar Paulus
,
Mohamed Bishr
…
(2014)
0
comments
Cited
2
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Trustworthiness monitoring and prediction of composite services
Hisain Elshaafi
,
Jimmy McGibney
,
Dmitri Botvich
(2012)
0
comments
Cited
1
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2015
Publication date (Online):
July 21 2015
Pages
: 357-368
DOI:
10.1007/978-3-319-20376-8_32
SO-VID:
e3d157fa-7f73-4454-9e48-294658f84fbe
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Single Trial Authentication with Mental Password Writing
pp. 13
Leap Motion Controller for Authentication via Hand Geometry and Gestures
pp. 23
Predicting Graphical Passwords
pp. 36
Principles of Persuasion in Social Engineering and Their Use in Phishing
pp. 48
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objects
pp. 59
Effects of Password Permutation on Subjective Usability Across Platforms
pp. 71
“Too Taxing on the Mind!” Authentication Grids are not for Everyone
pp. 83
Human Generated Passwords – The Impacts of Password Requirements and Presentation Styles
pp. 95
The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based Passwords
pp. 107
Investigating the Use of Gesture-Based Passwords by the Seniors
pp. 119
Password Policy Languages: Usable Translation from the Informal to the Formal
pp. 131
Usability of Activity-Based and Image-Based Challenge Questions in Online Student Authentication
pp. 143
Adjustable Fusion to Support Cyber Security Operators
pp. 154
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and Monitoring
pp. 165
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments
pp. 178
A Probabilistic Analysis Framework for Malicious Insider Threats
pp. 190
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud Environment
pp. 200
Factors Contributing to Performance for Cyber Security Forensic Analysis
pp. 207
Towards a Successful Exercise Implementation – A Case Study of Exercise Methodologies
pp. 219
CYSM: An Innovative Physical/Cyber Security Management System for Ports
pp. 231
Factors that Influence Information Security Behavior: An Australian Web-Based Study
pp. 242
Pervasive Monitoring as an Insider Threat
pp. 252
Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis
pp. 260
Privacy and Security in the Brave New World: The Use of Multiple Mental Models
pp. 271
Usable Trust: Grasping Trust Dynamics for Online Security as a Service
pp. 287
Exploring the Adoption of Physical Security Controls in Smartphones
pp. 299
What 4,500+ People Can Tell You – Employees’ Attitudes Toward Organizational Password Policy Do Matter
pp. 311
An Investigation of the Factors that Predict an Internet User’s Perception of Anonymity on the Web
pp. 323
Do Graphical Cues Effectively Inform Users?
pp. 335
Usable-Security Evaluation
pp. 347
Reminding Users of their Privacy at the Point of Interaction: The Effect of Privacy Salience on Disclosure Behaviour
pp. 357
Profit-Maximizing Trustworthiness Level of Composite Systems
pp. 369
Re-designing Permission Requirements to Encourage BYOD Policy Adherence
pp. 379
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System
pp. 391
Hey, I Have a Problem in the System: Who Can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy Problems
pp. 404
An Extensible Platform for the Forensic Analysis of Social Media Data
pp. 415
Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store Security
pp. 426
SafetyPIN: Secure PIN Entry Through Eye Tracking
pp. 436
An Identification of Variables Influencing the Establishment of Information Security Culture
pp. 449
Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective
pp. 463
Users’ Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II
pp. 475
Messaging Activity Reconstruction with Sentiment Polarity Identification
pp. 487
Televoting: Secure, Overseas Voting
pp. 495
Personalized Voting: The Intersection of Cloud and Mobility
pp. 506
Hobson’s Choice: Security and Privacy Permissions in Android and iOS Devices
pp. 517
Information Presentation: Considering On-line User Confidence for Effective Engagement
pp. 526
Privacy Principles in Design of Smart Homes Systems in Elderly Care
pp. 538
An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting System
pp. 547
Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual Integrity
pp. 559
Poll Workers and Election Integrity: Security as if People Mattered
pp. 570
From V2X to Control2Trust
pp. 582
Security Implications for Personal Assistive Technology in Voting
pp. 592
Perceptions of Personal Privacy in Smart Home Technologies: Do User Assessments Vary Depending on the Research Method?
pp. 607
Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri Nets
pp. 619
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems
pp. 631
Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime Research
pp. 642
Business and Threat Analysis of Ports’ Supply Chain Services
pp. 654
Insider Threats: The Major Challenge to Security Risk Management
pp. 664
Framework for Cloud Usability
pp. 672
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures
pp. 684
Applying the ACPO Guidelines to Building Automation Systems
pp. 693
Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-Making
pp. 705
XACML Privacy Policy Editor for Critical Infrastructures
Similar content
5,573
‘Local foods’ as trustworthy food: geographical proximity, social areas and interpersonal relationships
Authors:
Estelle Masson
,
Sandrine Bubendorff
Trustworthy multi-phase liver tumor segmentation via evidence-based uncertainty
Authors:
Chuanfei Hu
,
Tianyi Xia
,
Ying Cui
…
“He Gave Me His Hand but Took My Bow”: Trust and Trustworthiness in the Philoctetes and Our Wars
Authors:
Nancy Sherman
See all similar