000728397 000__ 03587cam\a2200553Ii\4500 000728397 001__ 728397 000728397 005__ 20230306141010.0 000728397 006__ m\\\\\o\\d\\\\\\\\ 000728397 007__ cr\cn\nnnunnun 000728397 008__ 150730s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000728397 020__ $$a9783319203768$$qelectronic book 000728397 020__ $$a3319203762$$qelectronic book 000728397 020__ $$z9783319203751 000728397 0247_ $$a10.1007/978-3-319-20376-8$$2doi 000728397 035__ $$aSP(OCoLC)ocn915137544 000728397 035__ $$aSP(OCoLC)915137544 000728397 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dAZU$$dYDXCP$$dVLB 000728397 049__ $$aISEA 000728397 050_4 $$aQA76.9.A25$$bH37 2015eb 000728397 08204 $$a005.8$$223 000728397 1112_ $$aHAS (Conference)$$n(3rd :$$d2015 :$$cLos Angeles, Calif.) 000728397 24510 $$aHuman aspects of information security, privacy, and trust$$h[electronic resource] :$$bthird international conference, HAS 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings /$$cTheo Tryfonas, Ioannis Askoxylakis (eds.). 000728397 2463_ $$aHAS 2015 000728397 264_1 $$aCham :$$bSpringer,$$c2015. 000728397 300__ $$a1 online resource (xviii, 719 pages) :$$billustrations. 000728397 336__ $$atext$$btxt$$2rdacontent 000728397 337__ $$acomputer$$bc$$2rdamedia 000728397 338__ $$aonline resource$$bcr$$2rdacarrier 000728397 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9190 000728397 4901_ $$aLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI 000728397 500__ $$aInternational conference proceedings. 000728397 500__ $$aIncludes author index. 000728397 5050_ $$aAuthentication -- Cybersecurity -- Privacy, security and user behaviour -- Security in social media and smart technologies -- Security Technologies. 000728397 506__ $$aAccess limited to authorized users. 000728397 520__ $$aThis book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies. 000728397 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 30, 2015). 000728397 650_0 $$aComputer security$$vCongresses. 000728397 650_0 $$aData encryption (Computer science)$$vCongresses. 000728397 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000728397 650_0 $$aComputer networks$$xAccess control$$vCongresses. 000728397 7001_ $$aTryfonas, Theo,$$eeditor. 000728397 7001_ $$aAskoxylakis, Ioannis,$$eeditor. 000728397 7112_ $$aInternational Conference on Human-Computer Interaction$$n(17th :$$d2015 :$$cLos Angeles, Calif.) 000728397 830_0 $$aLecture notes in computer science ;$$v9190. 000728397 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 000728397 852__ $$bebk 000728397 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-20376-8$$zOnline Access$$91397441.1 000728397 909CO $$ooai:library.usi.edu:728397$$pGLOBAL_SET 000728397 980__ $$aEBOOK 000728397 980__ $$aBIB 000728397 982__ $$aEbook 000728397 983__ $$aOnline 000728397 994__ $$a92$$bISE