Hci for Cybersecurity, Privacy and Trust: Third International Conference, Hci-CPT 2021, Held as Part of the 23rd Hci International Conference, Hcii 20 » książka
Usable Security.- Authentication Management of Home IoT Devices.- Emics and Etics of Usable Security: Culturally Specific or Culturally Universal?.- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks.- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review.- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes.- Risk Assessment of “Ostrich ZIP”.- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users.- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services.- Security and Privacy by Design.- Beyond Murphy’s Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience.- A Human Factor Approach to Threat Modeling.- Smart Technologies and Internet of Things Designed for Aging in Place.- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration.- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces.- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk.- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior.- Privacy Design Strategies and the GDPR: A Systematic Literature Review.- User Behavior Analysis in Cybersecurity.- ‘Just-in-Time’ Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure.- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices.- Perceptions of Security and Privacy in mHealth.- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.- CyberPin - Challenges on Recognizing Youngest Cyber Talents.- It’s Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness.- Understanding the Last Line of Defense: Human Response to Cybersecurity Events.- Security and Privacy Awareness.- The Effectiveness of Video Messaging Campaigns to Use 2FA.- A Study on Online Businesses’ Commitment to Consumer Privacy.- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks.- Social Engineering Attacks: Recent Advances and Challenges.- Brand Validation: Security Indicator to Better Indicate Website Identity.- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials.- Gaming Apps’ and Social Media Partnership: A Privacy Perspective.