Adjustable Fusion to Support Cyber Security Operators (Englisch)
- Neue Suche nach: Aguessy, François-Xavier
- Neue Suche nach: Bettan, Olivier
- Neue Suche nach: Dobigny, Romuald
- Neue Suche nach: Laudy, Claire
- Neue Suche nach: Lortal, Gaëlle
- Neue Suche nach: Faure, David
- Neue Suche nach: Tryfonas, Theo
- Neue Suche nach: Askoxylakis, Ioannis
- Neue Suche nach: Aguessy, François-Xavier
- Neue Suche nach: Bettan, Olivier
- Neue Suche nach: Dobigny, Romuald
- Neue Suche nach: Laudy, Claire
- Neue Suche nach: Lortal, Gaëlle
- Neue Suche nach: Faure, David
In:
Human Aspects of Information Security, Privacy, and Trust
: Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings
;
Kapitel: 13
;
143-153
;
2015
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Adjustable Fusion to Support Cyber Security Operators
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Tryfonas, Theo ( Herausgeber:in ) / Askoxylakis, Ioannis ( Herausgeber:in ) / Aguessy, François-Xavier ( Autor:in ) / Bettan, Olivier ( Autor:in ) / Dobigny, Romuald ( Autor:in ) / Laudy, Claire ( Autor:in ) / Lortal, Gaëlle ( Autor:in ) / Faure, David ( Autor:in )
-
Kongress:International Conference on Human Aspects of Information Security, Privacy, and Trust ; 2015 ; Los Angeles, CA, USA
-
Erschienen in:Human Aspects of Information Security, Privacy, and Trust : Third International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings ; Kapitel: 13 ; 143-153Lecture Notes in Computer Science ; 9190 ; 143-153
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:21.07.2015
-
Format / Umfang:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Single Trial Authentication with Mental Password WritingAbdulkader, Sarah N. / Atia, Ayman / Mostafa, Mostafa-Sami M. et al. | 2015
- 2
-
Leap Motion Controller for Authentication via Hand Geometry and GesturesChan, Alexander / Halevi, Tzipora / Memon, Nasir et al. | 2015
- 3
-
Predicting Graphical PasswordsDevlin, Matthieu / Nurse, Jason R. C. / Hodges, Duncan / Goldsmith, Michael / Creese, Sadie et al. | 2015
- 4
-
Principles of Persuasion in Social Engineering and Their Use in PhishingFerreira, Ana / Coventry, Lynne / Lenzini, Gabriele et al. | 2015
- 5
-
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged ObjectsFujita, Masahiro / Ikeya, Yuki / Kani, Junya / Nishigaki, Masakatsu et al. | 2015
- 6
-
Effects of Password Permutation on Subjective Usability Across PlatformsGreene, Kristen K. et al. | 2015
- 7
-
“Too Taxing on the Mind!” Authentication Grids are not for EveryoneKrol, Kat / Papanicolaou, Constantinos / Vernitski, Alexei / Sasse, M. Angela et al. | 2015
- 8
-
Human Generated Passwords – The Impacts of Password Requirements and Presentation StylesLee, Paul Y. / Choong, Yee-Yin et al. | 2015
- 9
-
The Authentication Equation: A Tool to Visualize the Convergence of Security and Usability of Text-Based PasswordsPloehn, Cathryn A. / Greene, Kristen K. et al. | 2015
- 10
-
Investigating the Use of Gesture-Based Passwords by the SeniorsSreeramareddy, Lakshmidevi / Mulbah, Pewu / Feng, Jinjuan Heidi et al. | 2015
- 11
-
Password Policy Languages: Usable Translation from the Informal to the FormalSteves, Michelle / Theofanos, Mary / Paulsen, Celia / Ribeiro, Athos et al. | 2015
- 12
-
Usability of Activity-Based and Image-Based Challenge Questions in Online Student AuthenticationUllah, Abrar / Xiao, Hannan / Barker, Trevor et al. | 2015
- 13
-
Adjustable Fusion to Support Cyber Security OperatorsAguessy, François-Xavier / Bettan, Olivier / Dobigny, Romuald / Laudy, Claire / Lortal, Gaëlle / Faure, David et al. | 2015
- 14
-
The Effects of Awareness Programs on Information Security in Banks: The Roles of Protection Motivation and MonitoringBauer, Stefan / Bernroider, Edward W.N. et al. | 2015
- 15
-
Analysis of Human Awareness of Security and Privacy Threats in Smart EnvironmentsCaviglione, Luca / Lalande, Jean-François / Mazurczyk, Wojciech / Wendzel, Steffen et al. | 2015
- 16
-
A Probabilistic Analysis Framework for Malicious Insider ThreatsChen, Taolue / Kammüller, Florian / Nemli, Ibrahim / Probst, Christian W. et al. | 2015
- 17
-
KYPO: A Tool for Collaborative Study of Cyberattacks in Safe Cloud EnvironmentEichler, Zdenek / Ošlejšek, Radek / Toth, Dalibor et al. | 2015
- 18
-
Factors Contributing to Performance for Cyber Security Forensic AnalysisHopkins, Shelby / Wilson, Andrew / Silva, Austin / Forsythe, Chris et al. | 2015
- 19
-
Towards a Successful Exercise Implementation – A Case Study of Exercise MethodologiesMakrodimitris, Georgios / Douligeris, Christos et al. | 2015
- 20
-
CYSM: An Innovative Physical/Cyber Security Management System for PortsPapastergiou, Spyridon / Polemi, Nineta / Karantjias, Athanasios et al. | 2015
- 21
-
Factors that Influence Information Security Behavior: An Australian Web-Based StudyPattinson, Malcolm / Butavicius, Marcus / Parsons, Kathryn / McCormac, Agata / Calic, Dragana et al. | 2015
- 22
-
Pervasive Monitoring as an Insider ThreatPolatin-Reuben, Dana et al. | 2015
- 23
-
Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model AnalysisSillaber, Christian / Breu, Ruth et al. | 2015
- 24
-
Privacy and Security in the Brave New World: The Use of Multiple Mental ModelsPrettyman, Sandra Spickard / Furman, Susanne / Theofanos, Mary / Stanton, Brian et al. | 2015
- 25
-
Usable Trust: Grasping Trust Dynamics for Online Security as a Servicevan der Graaf, Shenja / Vanobberghen, Wim / Kanakakis, Michalis / Kalogiros, Costas et al. | 2015
- 26
-
Exploring the Adoption of Physical Security Controls in SmartphonesAlshammari, Nasser O. / Mylonas, Alexios / Sedky, Mohamed / Champion, Justin / Bauer, Carolin et al. | 2015
- 27
-
What 4,500+ People Can Tell You – Employees’ Attitudes Toward Organizational Password Policy Do MatterChoong, Yee-Yin / Theofanos, Mary et al. | 2015
- 28
-
An Investigation of the Factors that Predict an Internet User’s Perception of Anonymity on the WebDevaraj, Shruti / Alfred, Myrtede / Madathil, Kapil Chalil / Gramopadhye, Anand K. et al. | 2015
- 29
-
Do Graphical Cues Effectively Inform Users?Ferreira, Ana / Huynen, Jean-Louis / Koenig, Vincent / Lenzini, Gabriele / Rivas, Salvador et al. | 2015
- 30
-
Usable-Security EvaluationHausawi, Yasser M. / Allen, William H. et al. | 2015
- 31
-
Reminding Users of their Privacy at the Point of Interaction: The Effect of Privacy Salience on Disclosure BehaviourHughes-Roberts, Thomas et al. | 2015
- 32
-
Profit-Maximizing Trustworthiness Level of Composite SystemsKalogiros, Costas / Kanakakis, Michalis / van der Graaf, Shenja / Vanobberghen, Wim et al. | 2015
- 33
-
Re-designing Permission Requirements to Encourage BYOD Policy AdherenceLee, Lotus / Still, Jeremiah D. et al. | 2015
- 34
-
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android SystemLi, Shancang / Chen, Junhua / Spyridopoulos, Theodoros / Andriotis, Panagiotis / Ludwiniak, Robert / Russell, Gordon et al. | 2015
- 35
-
Hey, I Have a Problem in the System: Who Can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy ProblemsMendes, Marilia S. / Furtado, Elizabeth / Militao, Guido / de Castro, Miguel F. et al. | 2015
- 36
-
An Extensible Platform for the Forensic Analysis of Social Media DataRead, Huw / Xynos, Konstantinos / Sutherland, Iain / Roarson, Frode / Andriotis, Panagiotis / Oikonomou, George et al. | 2015
- 37
-
Opinions or Algorithms: An Investigation of Trust in People Versus Automation in App Store SecuritySchuster, David / Still, Mary L. / Still, Jeremiah D. / Lim, Ji Jung / Feria, Cary S. / Rohrer, Christian P. et al. | 2015
- 38
-
SafetyPIN: Secure PIN Entry Through Eye TrackingSeetharama, Mythreya / Paelke, Volker / Röcker, Carsten et al. | 2015
- 39
-
An Identification of Variables Influencing the Establishment of Information Security CultureSherif, Emad / Furnell, Steven / Clarke, Nathan et al. | 2015
- 40
-
Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspectivede Souza, Patricia C. / Maciel, Cristiano et al. | 2015
- 41
-
Users’ Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity IIAcemyan, Claudia Z. / Kortum, Philip / Byrne, Michael D. / Wallach, Dan S. et al. | 2015
- 42
-
Messaging Activity Reconstruction with Sentiment Polarity IdentificationAndriotis, Panagiotis / Oikonomou, George et al. | 2015
- 43
-
Televoting: Secure, Overseas VotingCrawford, Chris S. / Mack, Naja / Eugene, Wanda / Gilbert, Juan E. et al. | 2015
- 44
-
Personalized Voting: The Intersection of Cloud and MobilityDawkins, Shaneé / Laskowski, Sharon et al. | 2015
- 45
-
Hobson’s Choice: Security and Privacy Permissions in Android and iOS DevicesHaggerty, John / Hughes-Roberts, Thomas / Hegarty, Robert et al. | 2015
- 46
-
Information Presentation: Considering On-line User Confidence for Effective EngagementKani-Zabihi, Elahe / Coles-Kemp, Lizzie / Helmhout, Martin et al. | 2015
- 47
-
Privacy Principles in Design of Smart Homes Systems in Elderly CareKolkowska, Ella et al. | 2015
- 48
-
An Extension and Validation of the Task-Technology Fit: A Case of a Mobile Phone Voting SystemMpekoa, Noluntu / Bere, Aaron et al. | 2015
- 49
-
Signs of Time: Designing Social Networking Site Profile Interfaces with Temporal Contextual IntegrityNovotny, Alexander et al. | 2015
- 50
-
Poll Workers and Election Integrity: Security as if People MatteredQuesenbery, Whitney / Chisnell, Dana et al. | 2015
- 51
-
From V2X to Control2TrustSchmidt, Teresa / Philipsen, Ralf / Ziefle, Martina et al. | 2015
- 52
-
Security Implications for Personal Assistive Technology in VotingSwierenga, Sarah J. / Zantjer, Rebecca S. / Jackson, James E. / Ismirle, Jennifer / Blosser, Stephen R. / Pierce, Graham L. et al. | 2015
- 53
-
Perceptions of Personal Privacy in Smart Home Technologies: Do User Assessments Vary Depending on the Research Method?Wilkowska, Wiktoria / Ziefle, Martina / Himmel, Simon et al. | 2015
- 54
-
Risk Modeling and Analysis of Interdependencies of Critical Infrastructures Using Colored Timed Petri NetsAgathangelou, Chrysovalandis / Georgiou, Chryssis / Papailiou, Ileana / Philippou, Anna / Pouis, Loucas / Tertytchny, Georgios / Vakana, Despina et al. | 2015
- 55
-
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous SystemsFysarakis, Konstantinos / Hatzivasilis, George / Askoxylakis, Ioannis / Manifavas, Charalampos et al. | 2015
- 56
-
Putting a Hat on a Hen? Learnings for Malicious Insider Threat Prevention from the Background of German White-Collar Crime ResearchHugl, Ulrike et al. | 2015
- 57
-
Business and Threat Analysis of Ports’ Supply Chain ServicesPapastergiou, Spyridon / Polemi, Nineta / Papagiannopoulos, Ioannis et al. | 2015
- 58
-
Insider Threats: The Major Challenge to Security Risk ManagementPereira, Teresa / Santos, Henrique et al. | 2015
- 59
-
Framework for Cloud UsabilityStanton, Brian / Theofanos, Mary / Joshi, Karuna P. et al. | 2015
- 60
-
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures FailuresStergiopoulos, George / Theocharidou, Marianthi / Gritzalis, Dimitris et al. | 2015
- 61
-
Applying the ACPO Guidelines to Building Automation SystemsSutherland, Iain / Spyridopoulos, Theodoros / Read, Huw / Jones, Andy / Sutherland, Graeme / Burgess, Mikhailia et al. | 2015
- 62
-
Visualizing BACnet Data to Facilitate Humans in Building-Security Decision-MakingTonejc, Jernej / Kaur, Jaspreet / Karsten, Adrian / Wendzel, Steffen et al. | 2015
- 63
-
XACML Privacy Policy Editor for Critical InfrastructuresUlltveit-Moe, Nils / Nergaard, Henrik / Gjøsæter, Terje / Betts, Jennifer et al. | 2015