Warehouse Stock Clearance Sale

Grab a bargain today!


Human Aspects of Information Security, Privacy, and Trust
By

Rating

Product Description
Product Details

Table of Contents

Usable Security.- On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security.- A Network Telescope for Early Warning Intrusion Detection.- Visualization of System Log Files for Post-incident Analysis and Response.- An Assessment Framework for Usable-Security Based on Decision Science.- On Designing Usable Policy Languages for Declarative Trust Aggregation.- An Image-Based CAPTCHA Using Sophisticated Mental Rotation.- What Usable Security Really Means: Trusting and Engaging Users.- QR Code Security: A Survey of Attacks and Challenges for Usable Security.- Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India.- Discrete Hardware Apparatus and Method for Mobile Application and Communication Security.- Authentication and Passwords Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method.- A Cognitive-Behavioral Framework of User Password Management Lifecycle.- Do Graphical Authentication Systems Solve the Password Memorability Problem.- E-voting Authentication with QR-codes.- I Can’t Type That! P@$$w0rd Entry on Mobile Devices.- Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention.- ACCESS: Describing and Contrasting – Authentication Mechanisms.- Character Strings, Memory and Passwords: What a Recall Study Can Tell Us.- Security Policy and Awareness.- From Regulations to Practice: Achieving Information Security Compliance in Healthcare.- Rethinking the Smart Card Technology.- Compositional Security Modelling: Structure, Economics, and Behaviour.- End User Development and Information Security Culture.- DSAPE – Dynamic Security Awareness Program Evaluation.- A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches.- Changing Faces: Identifying Complex Behavioural Profiles.- Human Behaviour in Cybersecurity.- A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.- Socio-technical Security Analysis of Wireless Hotspots.- A Conceptual Framework to Study Socio-Technical Security.- An Evaluation of Behavioural Profiling on Mobile Devices.- Nudging for Quantitative Access Control Systems.- Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.- The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role of Security Culture.- Privacy Issues.- User Acceptance of Privacy-ABCs: An Exploratory Study.- “My Life Doesn’t Have to Be an Open Book”: A Model to Help Designers to Enhance Privacy Controls on Social Network Sites.- Paper Audit Trails and Voters’ Privacy Concerns.- Mental Models for Usable Privacy: A Position Paper.- Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users.- Privacy Protection Based Privacy ConflictDetection and Solution in Online Social Networks.

Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond.com, Inc.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.