To Allow, or Deny? That is the Question

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:HCI-CPT (2. : 2020 : Online) HCI for cybersecurity, privacy and trust
1. Verfasser: Andriotis, Panagiotis (VerfasserIn)
Weitere Verfasser: Takasu, Atsuhiro (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR) 2020 Alqahtani, Hamed
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change? 2020 Blythe, John M.
To Allow, or Deny? That is the Question 2020 Andriotis, Panagiotis
Understanding Users’ Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior 2020 Ghosh, Charulata
Mental Model Mapping Method for Cybersecurity 2020 Kullman, Kaur
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks 2020 Paxton-Fear, Katie
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design 2020 Bishop, Laura M.
Building Connections for a Secure User Experience 2020 Blank, David
Development of a Test Battery for Cyber Soldiers 2020 Lif, Patrik
"Trust Me, You Will Need It”: Cybersecurity as Extracurricular Subject at Estonian Schools 2020 Lorenz, Birgy
A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations 2020 Morgan, Phillip L.
Clearing the Hurdles: How to Design Privacy Nudges for Mobile Application Users 2020 Döbelt, Susen
Enabling Medical Research Through Privacy-Preserving Data Markets 2020 Ghaffaripour, Shadan
Modelling and Presentation of Privacy-Relevant Information for Internet Users 2020 Feth, Denis
Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges 2020 Haney, Julie M.
Perspectives on Information Technology Artefacts in Trust-Related Interactions 2020 Koelmann, Holger
Cyber Security Threats and Incidents in Industrial Control Systems 2020 Mehrfeld, Jens
Usable Security by Design: A Pattern Approach 2020 Naqvi, Bilal
Awareness and Working Knowledge of Secure Design Principles: A User Study 2020 Almousa, May
Analyzing Cybersecurity Understanding Using a Brain Computer Interface 2020 Capellan, Kingberli
Alle Artikel auflisten