Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:HCI-CPT (3. : 2021 : Online) HCI for cybersecurity, privacy and trust
1. Verfasser: Alam, Aniqa (VerfasserIn)
Weitere Verfasser: Biddle, Robert (VerfasserIn), Stobert, Elizabeth (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal? 2021 Alam, Aniqa
Development of a Novice-Friendly Representation of Camouflaged Boolean Networks 2021 Hamadache, Salsabil
Identity Recognition Based on the Hierarchical Behavior Characteristics of Network Users 2021 Wang, Biao
Beyond Murphy’s Law: Applying Wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience 2021 Fairburn, Nicola
A Human Factor Approach to Threat Modeling 2021 Ferro, Lauren S.
Privacy Design Strategies and the GDPR: A Systematic Literature Review 2021 Saltarella, Marco
Heuristic Evaluation of Vulnerability Risk Management Leaders’ Presentations of Cyber Threat and Cyber Risk 2021 Nichols, Chris
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices 2021 Al-Ameen, Mahdi Nasrullah
Perceptions of Security and Privacy in mHealth 2021 Ferreira, Ana
It’s Not My Problem: How Healthcare Models Relate to SME Cybersecurity Awareness 2021 Pickering, Brian
Understanding the Last Line of Defense: Human Response to Cybersecurity Events 2021 Rebensky, Summer
Gaming Apps’ and Social Media Partnership: A Privacy Perspective 2021 Wang, Tian
Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes 2021 Leonidou, Pantelitsa
Human Individual Difference Predictors in Cyber-Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior 2021 Raywood-Burke, George
Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account 2021 Kocabas, Huzeyfe
CyberPin - Challenges on Recognizing Youngest Cyber Talents 2021 Lorenz, Birgy
Social Engineering Attacks: Recent Advances and Challenges 2021 Mashtalyar, Nikol
Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services 2021 Wilusz, Daniel
Please Stop Listening While I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration 2021 Kim, Jongkeon
The Effectiveness of Video Messaging Campaigns to Use 2FA 2021 Qahtani, Elham Al
Alle Artikel auflisten