HCI Bibliography Home | HCI Conferences | HAS Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
HAS Tables of Contents: 1314

HAS 2014: 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust

Fullname:HAS 2014: 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust
Note:Volume 24 of HCI International 2014
Editors:Theo Tryfonas; Ioannis Askoxylakis
Location:Heraklion, Crete, Greece
Dates:2014-Jun-22 to 2014-Jun-27
Publisher:Springer International Publishing
Series:Lecture Notes in Computer Science 8533
Standard No:DOI: 10.1007/978-3-319-07620-1 hcibib: HAS14; ISBN: 978-3-319-07619-5 (print), 978-3-319-07620-1 (online)
Links:Online Proceedings | Conference Website
  1. Usable Security
  2. Authentication and Passwords
  3. Security Policy and Awareness
  4. Human Behaviour in Cybersecurity
  5. Privacy Issues

Usable Security

On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security BIBAKFull-Text 3-10
  Marios Belk; Christos Fidas; Panagiotis Germanakos; George Samaras
A Network Telescope for Early Warning Intrusion Detection BIBAKFull-Text 11-22
  Panos Chatziadam; Ioannis G. Askoxylakis; Alexandros Fragkiadakis
Visualization of System Log Files for Post-incident Analysis and Response BIBAKFull-Text 23-32
  John Haggerty; Thomas Hughes-Roberts
An Assessment Framework for Usable-Security Based on Decision Science BIBAKFull-Text 33-44
  Yasser M. Hausawi; William H. Allen
On Designing Usable Policy Languages for Declarative Trust Aggregation BIBAFull-Text 45-56
  Michael Huth; Jim Huan-Pu Kuo
An Image-Based CAPTCHA Using Sophisticated Mental Rotation BIBAKFull-Text 57-68
  Yuki Ikeya; Masahiro Fujita; Junya Kani; Yuta Yoneyama; Masakatsu Nishigaki
What Usable Security Really Means: Trusting and Engaging Users BIBAKFull-Text 69-78
  Iacovos Kirlappos; M. Angela Sasse
QR Code Security: A Survey of Attacks and Challenges for Usable Security BIBAKFull-Text 79-90
  Katharina Krombholz; Peter Frühwirt; Peter Kieseberg; Ioannis Kapsalis; Markus Huber; Edgar Weippl
Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India BIBAKFull-Text 91-101
  Rutuja More; Abhishek Bora
Discrete Hardware Apparatus and Method for Mobile Application and Communication Security BIBAKFull-Text 102-112
  Paschalis Papagrigoriou; Anargyros Plemenos; Ioannis G. Askoxylakis

Authentication and Passwords

Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method BIBAKFull-Text 115-126
  Panagiotis Andriotis; Theo Tryfonas; George Oikonomou
A Cognitive-Behavioral Framework of User Password Management Lifecycle BIBAKFull-Text 127-137
  Yee-Yin Choong
Do Graphical Authentication Systems Solve the Password Memorability Problem? BIBAKFull-Text 138-148
  Soumyadeb Chowdhury; Ron Poet; Lewis Mackenzie
E-voting Authentication with QR-codes BIBAKFull-Text 149-159
  Stefanie Falkner; Peter Kieseberg; Dimitris E. Simos; Christina Traxler; Edgar Weippl
I Can't Type That! P@$$w0rd Entry on Mobile Devices BIBAKFull-Text 160-171
  Kristen K. Greene; Melissa A. Gallagher; Brian C. Stanton; Paul Y. Lee
Capturing Attention for Warnings about Insecure Password Fields -- Systematic Development of a Passive Security Intervention BIBAKFull-Text 172-182
  Nina Kolb; Steffen Bartsch; Melanie Volkamer; Joachim Vogt
ACCESS: Describing and Contrasting BIBAFull-Text 183-194
  Karen Renaud; Melanie Volkamer; Joseph Maguire
Character Strings, Memory and Passwords: What a Recall Study Can Tell Us BIBAKFull-Text 195-206
  Brian C. Stanton; Kristen K. Greene

Security Policy and Awareness

From Regulations to Practice: Achieving Information Security Compliance in Healthcare BIBAKFull-Text 209-220
  Subrata Acharya; Brian Coats; Arpit Saluja; Dale Fuller
Rethinking the Smart Card Technology BIBAFull-Text 221-232
  Raja Naeem Akram; Konstantinos Markantonakis
Compositional Security Modelling BIBAFull-Text 233-245
  Tristan Caulfield; David Pym; Julian Williams
End User Development and Information Security Culture BIBAKFull-Text 246-257
  Fredrik Karlsson; Karin Hedström
DSAPE -- Dynamic Security Awareness Program Evaluation BIBAKFull-Text 258-269
  Charalampos Manifavas; Konstantinos Fysarakis; Konstantinos Rantos; George Hatzivasilis
A Critical Reflection on the Threat from Human Insiders -- Its Nature, Industry Perceptions, and Detection Approaches BIBAKFull-Text 270-281
  Jason R. C. Nurse; Philip A. Legg; Oliver Buckley; Ioannis Agrafiotis; Gordon Wright; Monica Whitty; David Upton; Michael Goldsmith; Sadie Creese
Changing Faces: Identifying Complex Behavioural Profiles BIBAFull-Text 282-293
  Giles Oatley; Tom Crick

Human Behaviour in Cybersecurity

A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations BIBAKFull-Text 297-305
  Reza Alavi; Shareeful Islam; Haralambos Mouratidis
Socio-technical Security Analysis of Wireless Hotspots BIBAKFull-Text 306-317
  Ana Ferreira; Jean-Louis Huynen; Vincent Koenig; Gabriele Lenzini
A Conceptual Framework to Study Socio-Technical Security BIBAKFull-Text 318-329
  Ana Ferreira; Jean-Louis Huynen; Vincent Koenig; Gabriele Lenzini
An Evaluation of Behavioural Profiling on Mobile Devices BIBAKFull-Text 330-339
  Fudong Li; Ross Wheeler; Nathan Clarke
Nudging for Quantitative Access Control Systems BIBAFull-Text 340-351
  Charles Morisset; Thomas Groß; Aad van Moorsel; Iryna Yevseyeva
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior BIBAKFull-Text 352-360
  Mariam Nouh; Abdullah Almaatouq; Ahmad Alabdulkareem; Vivek K. Singh; Erez Shmueli; Mansour Alsaleh; Abdulrahman Alarifi; Anas Alfaris; Alex 'Sandy' Pentland
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture BIBAFull-Text 361-372
  Karen Renaud; Wendy Goucher

Privacy Issues

User Acceptance of Privacy-ABCs: An Exploratory Study BIBAKFull-Text 375-386
  Zinaida Benenson; Anna Girard; Ioannis Krontiris; Vassia Liagkou; Kai Rannenberg; Yannis Stamatiou
"My Life Doesn't Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites BIBAKFull-Text 387-399
  Francine B. Bergmann; Milene S. Silveira
Paper Audit Trails and Voters' Privacy Concerns BIBAKFull-Text 400-409
  Jurlind Budurushi; Simon Stockhardt; Marcel Woide; Melanie Volkamer
Mental Models for Usable Privacy: A Position Paper BIBAKFull-Text 410-421
  Kovila P. L. Coopamootoo; Thomas Groß
Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users? BIBAKFull-Text 422-432
  Anna L. Langhorne
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks BIBAKFull-Text 433-445
  Arunee Ratikan; Mikifumi Shikida