HCI Bibliography Home | HCI Conferences | HAS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
HAS Tables of Contents: 1314

HAS 2013: 1st International Conference on Human Aspects of Information Security, Privacy, and Trust

Fullname:HAS 2013: First International Conference on Human Aspects of Information Security, Privacy, and Trust
Note:Volume 27 of HCI International 2013
Editors:Louis Marinos; Ioannis Askoxylakis
Location:Las Vegas, Nevada
Dates:2013-Jul-21 to 2013-Jul-26
Publisher:Springer Berlin Heidelberg
Series:Lecture Notes in Computer Science 8030
Standard No:DOI: 10.1007/978-3-642-39345-7 hcibib: HAS13; ISBN: 978-3-642-39344-0 (print), 978-3-642-39345-7 (online)
Papers:39
Pages:378
Links:Online Proceedings
  1. Novel Authentication Systems
  2. Human Factors in Security
  3. Security and Privacy Policies
  4. User Centric Security and Privacy

Novel Authentication Systems

Evaluating the Usability of System-Generated and User-Generated Passwords of Approximately Equal Security BIBAKFull-Text 3-12
  Sourav Bhuyan; Joel S. Greenstein; Kevin A. Juang
Multicriteria Optimization to Select Images as Passwords in Recognition Based Graphical Authentication Systems BIBAKFull-Text 13-22
  Soumyadeb Chowdhury; Ron Poet; Lewis Mackenzie
Investigating an Intrusion Prevention System for Brain-Computer Interfaces BIBAFull-Text 23-28
  Saul D. Costa; Dale R. Stevens; Jeremy A. Hansen
Inconspicuous Personal Computer Protection with Touch-Mouse BIBAFull-Text 29-38
  Ming-Chun Huang; Wenyao Xu; Jason J. Liu; Yi Su; Lei He; Majid Sarrafzadeh
Gamified CAPTCHA BIBAKFull-Text 39-48
  Junya Kani; Masakatsu Nishigaki
Recognition of Human Identity by Detection of User Activity BIBAFull-Text 49-58
  Giuseppe Scardino; Ignazio Infantino; Filippo Vella
Learning a Policy for Gesture-Based Active Multi-touch Authentication BIBAFull-Text 59-68
  Raquel Torres Peralta; Anton Rebguns; Ian R. Fasel; Kobus Barnard

Human Factors in Security

Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA Mechanisms BIBAKFull-Text 71-79
  Marios Belk; Panagiotis Germanakos; Christos Fidas; George Spanoudis; George Samaras
Relationships between Password Choices, Perceptions of Risk and Security Expertise BIBAFull-Text 80-89
  Sadie Creese; Duncan Hodges; Sue Jamison-Powell; Monica Whitty
Influence of Trust Assurances in Mobile Commerce Applications on the Formation of Online Trust BIBAFull-Text 90-99
  Martin Hesseler; Gerhard Hartmann; Stefan Karsch
A Comparison of American and German Folk Models of Home Computer Security BIBAKFull-Text 100-109
  Michaela Kauer; Sebastian Günther; Daniel Storck; Melanie Volkamer
Health Is Silver, Beauty Is Golden? BIBAKFull-Text 110-118
  Johanna Kluge; Martina Ziefle
A Study Using TAM on the Recognition of Individuals' Privacy and the Acceptance of Risk BIBAKFull-Text 119-126
  Ayako Komatsu
Personality's Influence on Facebook's Privacy Settings: A Case of College Students in Taiwan BIBAKFull-Text 127-134
  Tingya Kuo; Hung-Lian Tang
An Influence of Self-evaluated Gender Role on the Privacy Management Behavior in Online Social Networks BIBAKFull-Text 135-144
  Kijung Lee; Il-Yeol Song
A Taxonomy of Cyber Awareness Questions for the User-Centered Design of Cyber Situation Awareness BIBAKFull-Text 145-154
  Celeste Lyn Paul; Kirsten Whitley
Click Me If You Can! BIBAKFull-Text 155-166
  Thomas Pfeiffer; Heike Theuerling; Michaela Kauer
Increasing Trust Perceptions in the Internet of Things BIBAFull-Text 167-175
  Trenton Schulz; Ingvar Tjøstheim
Perception of Risky Security Behaviour by Users: Survey of Current Approaches BIBAKFull-Text 176-185
  Lynsay A. Shepherd; Jacqueline Archibald; R. I. Ferguson
Understanding People's Preferences for Disclosing Contextual Information to Smartphone Apps BIBAFull-Text 186-196
  Fuming Shih; Julia Boortz
Constructing Positive Influences for User Security Decisions to Counter Corporate or State Sponsored Computer Espionage Threats BIBAKFull-Text 197-206
  Martyn Styles

Security and Privacy Policies

Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps BIBAKFull-Text 209-216
  Kalliopi Anastasopoulou; Theo Tryfonas; Spyros Kokolakis
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers BIBAKFull-Text 217-225
  Steven Furnell; Nina Bär
Ethical Issues Surrounding the Asymmetric Nature of Workplace Monitoring BIBAKFull-Text 226-235
  John D. Bustard
A Reasonable Expectation of Privacy? Secrecy and National Security in a Democracy BIBAKFull-Text 236-245
  Kathleen M. Hogan
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent BIBAFull-Text 246-255
  Michael Huth; Jim Huan-Pu Kuo; Angela Sasse; Iacovos Kirlappos
Modeling Security Policy and the Effect for End-Users BIBAFull-Text 256-265
  Kevin D. Jones; Kizito Salako
Legal Protection for Personal Information Privacy BIBAKFull-Text 266-275
  Yinan Liu
"The Four Most-Used Passwords Are Love, Sex, Secret, and God": Password Security and Training in Different User Groups BIBAKFull-Text 276-283
  Birgy Lorenz; Kaido Kikkas; Aare Klooster
The Privacy Paradox between Users' Attitudes, Stringent Legal Framework and (the Lack of) Adequate Implementation Tools BIBAKFull-Text 284-294
  Shara Monteleone

User Centric Security and Privacy

Addressing User Privacy and Experience in Distributed Long Lifetime Systems BIBAFull-Text 297-305
  Scott W. Cadzow
Secure and Energy-Efficient Life-Logging in Wireless Pervasive Environments BIBAFull-Text 306-315
  Alexandros Fragkiadakis; Ioannis Askoxylakis; Elias Tragos
Supporting Human Decision-Making Online Using Information-Trustworthiness Metrics BIBAKFull-Text 316-325
  Jason R. C. Nurse; Sadie Creese; Michael Goldsmith; Syed Sadiqur Rahman
On the Secure and Safe Data Synchronization BIBAKFull-Text 326-331
  Pavel Ocenasek; Jaromir Karmazin
The Practice of Global Internet Filtering BIBAKFull-Text 332-337
  Pavel Ocenasek
A Privacy-Level Model of User-Centric Cyber-Physical Systems BIBAKFull-Text 338-347
  Nikolaos E. Petroulakis; Ioannis G. Askoxylakis; Apostolos Traganitis; George Spanoudakis
High-Level Design for a Secure Mobile Device Management System BIBAKFull-Text 348-356
  Keunwoo Rhee; Sun-Ki Eun; Mi-Ri Joo; Jihoon Jeong; Dongho Won
Factors Influencing Adoption of Encryption to Secure Data in the Cloud BIBAFull-Text 357-365
  Kenneth E. Stavinoha
Cloudopsy: An Autopsy of Data Flows in the Cloud BIBAFull-Text 366-375
  Angeliki Zavou; Vasilis Pappas; Vasileios P. Kemerlis; Michalis Polychronakis; Georgios Portokalidis; Angelos D. Keromytis