A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:HCI-CPT (2. : 2020 : Online) HCI for cybersecurity, privacy and trust
1. Verfasser: Morgan, Phillip L. (VerfasserIn)
Weitere Verfasser: Asquith, Phoebe M. (VerfasserIn), Bishop, Laura M. (VerfasserIn), Raywood-Burke, George (VerfasserIn), Wedgbury, Adam (VerfasserIn), Jones, Kevin (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Does Decision-Making Style Predict Individuals Cybersecurity Avoidance Behaviour? 2020 Algahtani, Hamed
Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour 2020 Coventry, Lynne
Another Week at the Office (AWATO) — An Interactive Serious Game for Threat Modeling Human Factors 2020 Ferro, Lauren S.
Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice 2020 Khan, Laheem
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity? 2020 Reeves, Andrew
Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness? 2020 Reeves, Andrew
Natural vs. Technical Language Preference and Their Impact on Firewall Configuration 2020 Voronkov, Artem
Understanding Privacy and Trust in Smart Home Environments 2020 Schomakers, Eva-Maria
Privacy Apps for Smartphones: An Assessment of Users Preferences and Limitations 2020 Sharma, Tanusree
Cyberspace and Cyberculture: The New Social and Governance Field 2020 Ward, Rodolfo
Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network 2020 Wang, Yuhan
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR) 2020 Alqahtani, Hamed
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change? 2020 Blythe, John M.
To Allow, or Deny? That is the Question 2020 Andriotis, Panagiotis
Understanding Users’ Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior 2020 Ghosh, Charulata
Mental Model Mapping Method for Cybersecurity 2020 Kullman, Kaur
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks 2020 Paxton-Fear, Katie
Awareness and Working Knowledge of Secure Design Principles: A User Study 2020 Almousa, May
Analyzing Cybersecurity Understanding Using a Brain Computer Interface 2020 Capellan, Kingberli
Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors 2020 Molyneaux, Heather
Alle Artikel auflisten