default search action
HCI 2022: Virtual Event - Volume 32
- Abbas Moallem:
HCI for Cybersecurity, Privacy and Trust - 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13333, Springer 2022, ISBN 978-3-031-05562-1
User Privacy and Data Protection
- Hanieh Atashpanjeh, Arezou Behfar, Cassity Haverkamp, Maryellen McClain Verdoes, Mahdi Nasrullah Al-Ameen:
Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young Adults. 3-15 - Cong Cao, Miaomiao Zheng, Linyao Ni:
Improving Consumer Data Privacy Protection and Trust in the Context of the Digital Platform. 16-29 - Ruichen Cong, Yixiao Liu, Yenjou Wang, Kiichi Tago, Ruidong Li, Hitoshi Asaeda, Qun Jin:
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE. 30-41 - Alexandra Mai, Leonard Guelmino, Katharina Pfeffer, Edgar R. Weippl, Katharina Krombholz:
Mental Models of the Internet and Its Online Risks: Children and Their Parent(s). 42-61 - Luca Mazzola, Andreas Waldis, Atreya Shankar, Diamantis Argyris, Alexander Denzler, Michiel Van Roey:
Privacy and Customer's Education: NLP for Information Resources Suggestions and Expert Finder Systems. 62-77 - Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. 78-93 - Temechu Girma Zewdie, Anteneh Girma:
Securing Software Defining Network from Emerging DDoS Attack. 94-103
Trustworthiness and User Experience in Cybersecurity
- Maria Chaparro Osman, Andrew Nakushian, Summer Rebensky, Tricia Prior, Meredith B. Carroll:
User Experience, Knowledge, Perceptions, and Behaviors Associated with Internet of Things (IoT) Device Information Privacy. 107-123 - Shreya Gupta, Steven Furnell:
From Cybersecurity Hygiene to Cyber Well-Being. 124-134 - Julie M. Haney, Jody L. Jacobs, Fernando Barrientos, Susanne M. Furman:
Lessons Learned and Suitability of Focus Groups in Security Information Workers Research. 135-153 - Danielle Renee Jacobs, Troy McDaniel:
A Survey of User Experience in Usable Security and Privacy Research. 154-172 - Alexandra Mai, Oliver Schedler, Edgar R. Weippl, Katharina Krombholz:
Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations. 173-193 - Sadaira Packer, Cheryl D. Seals, Gerry V. Dozier:
Towards the Improvement of UI/UX of a Human-AI Adversarial Authorship System. 194-205
Multi-faceted Authentication Methods and Tools
- Panagiotis Andriotis, Myles Kirby, Atsuhiro Takasu:
Bu-Dash: A Universal and Dynamic Graphical Password Scheme. 209-227 - Oluwadamilola Arinde, Jinjuan Feng, Ziying Tang:
A Preliminary Investigation of Authentication of Choice in Health-Related Mobile Applications. 228-240 - Isao Nakanishi:
On-Demand Biometric Authentication for System-User Management. 241-254 - Youngeun Song, Ian Oakley:
PushID: A Pressure Control Interaction-Based Behavioral Biometric Authentication System for Smartwatches. 255-267 - Hideaki Terui, Hiroshi Hosobe:
A Hand Gesture-Based Authentication Method that Makes Forgery Difficult. 268-279 - Manisha Varma, Stacey Watson, Liwei Chan, Roshan Lalintha Peiris:
VibroAuth: Authentication with Haptics Based Non-visual, Rearranged Keypads to Mitigate Shoulder Surfing Attacks. 280-303
HCI in Cyber Defense and Protection
- Asmaa Aljohani, James Jones:
The Pitfalls of Evaluating Cyber Defense Techniques by an Anonymous Population. 307-325 - Morgan L. Ferretti, Timothy Richards, Jessica G. Irons, Kirsten Richards:
The Dimensionality of the Cyber Warrior. 326-339 - Florian Kammüller, Chelsea Mira Alvarado:
Exploring Rationality of Self Awareness in Social Networking for Logical Modeling of Unintentional Insiders. 340-357 - Jennifer A. McKneely, Tara K. Sell, Kathleen A. Straub, Mika D. Ayenson, Daniel Thomas:
Shaping Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework. 358-379
Studies on Usable Security in Intelligent Environments
- Leena Alghamdi, Ashwaq Alsoubai, Mamtaj Akter, Faisal Alghamdi, Pamela J. Wisniewski:
A User Study to Evaluate a Web-Based Prototype for Smart Home Internet of Things Device Management. 383-405 - Laura Lynggaard Nielsen:
What Makes IoT Secure? A Maturity Analysis of Industrial Product Manufacturers' Approaches to IoT Security. 406-421 - Michael Shlega, Sana Maqsood, Sonia Chiasson:
Users, Smart Homes, and Digital Assistants: Impact of Technology Experience and Adoption. 422-443 - Markus Frogner Werner, Ida Ness, Cristina Paupini:
Privacy in the Smart Household: Towards a Risk Assessment Model for Domestic IoT. 444-454
The Impact of the Covid-19 Pandemic on Cybersecurity
- Nirmal Acharya, Abhishek Sharma:
Demarcating the Privacy Issues of Aarogya Setu App in Covid-19 Pandemic in India: An Exploration into Contact Tracing Mobile Applications from Elaboration Likelihood Model. 457-468 - Ardiansyah, M. Rafi, Pahmi Amri:
The Importance of Strengthening Legal Concepts in Overcoming Cybercrime During the Covid-19 Pandemic in Indonesia. 469-479 - Abhishek Sharma, Chandana Hewege, Chamila Perera:
Exploration of Privacy, Ethical and Regulatory Concerns Related to COVID-19 Vaccine Passport Implementation. 480-491 - Tian Wang, Masooda N. Bashir:
Attitudes Towards the Use of COVID-19 Apps and Its Associated Factors. 492-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.