Linked e-resources
Details
Table of Contents
[I]. Authentication: Grid authentication : a memorability and user sentiment study / Paul Biocco and Mohd Anwar
Consonant-vowel-consonant for error-free code entry / Nikola K. Blanchard, Leila Gabasova, and Ted Selker
Two-factor authentication using leap motion and numeric keypad / Tomoki Manabe and Hayato Yamana
Identity verification using face recognition for artificial-intelligence electronic forms with speech interaction / Akitoshi Okumura, Shuji Komeiji, Motohiko Sakaguchi, Masahiro Tabuchi, and Hiroaki Hattori
BREAKING : password entry is fine / Catlin Pidel and Stephan Neuhaus
Explore-a-nation : combining graphical and alphanumeric authentication / Lauren N. Tiller, Catherine A. Angelini, Sarah C. Leibner, and Jeremiah D. Still.
[II]. Cybersecurity awareness and behavior: From cyber-security deception to manipulation and gratification through gamification / Xavier Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, and Robert Atkinson
Gamifying security awareness : a new prototype / John Russell Cole, Toni Pence, Jeffrey Cummings, and Elizabeth Baker
Alertin users about phishing attacks / Giuseppe Desolda, Francesco Di Nocera, Lauren Ferro, Rosa Lanzilotti, Piero Maggi, and Andrea Marrella
Social preferences in decision making under cybersecurity risks and uncertainties / Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, and Christopher Frantz
Understanding perceptions : user responses to browser warning messages / Heather Molyneaux, Irina Kondratova, and Elizabeth Stobert
Understanding parents' concerns with smart device usage in the home / Aarathi Prasad, Ruben Ruiz, and Timothy Stablein
Gamification techniques for raising cyber security awareness / Sam Scholefield and Lynsay A. Shepherd
An identification method of untrusted interactive behavior in ERP system based on Markov chain / Mengyao Xu, Qian Yi, Shuping Yi, and Shiquan Xiong.
[III]. Security and usability: A framework of information security integrated with human factors / Ahmed I. Al-Darwish and Pilsung Choe
Making sense of Darknet markets : automatic inference of emantic classifications from unconventional multimedia datasets / Alexander Berman and Celeste Lyn Paul
Policy creation for enterprise-level data sharing / Linda Briesemeister, Woodrow Gustafson, Grit Denker, April Martin, Karsten Martiny, Ron Moore, Dusko Pavlovic, and Mark St. John
Classification of web history tools through web analysis / João Rafael Gonçalves Evangelista, Dacyr Dante de Oliveira Gatto, and Renato José Sassi
Investigating visualisation techniques for rapid triage of digital forensic evidence / Gavin Hales and Ethan Bayne
Behind the façade : paradigms in ubiquitous cryptography / Aaron MacSween and Yann Flory
Interdependencies, conflicts and trade-offs between security and usability : why and how should we engineer them? / Bilal Naqvi and Ahmed Seffah
Informing hybrid system design in cyber security incident response / Megan Nyre-Yu, Kelly A. Sprehn, and Barrett S. Caldwell
Revolutionizing the visual design of capture the flag (CTF) competitions / Rukman Senanayake, Phillip Porras, and Jason Kaehler.
[IV]. Privacy and trust: Reciprocities or incentives? Understanding privacy intrusion perspectives and sharing behaviors / Ala Sarah Alaqra and Erik Wästlund
Trust in autonomous technologies : a contextual comparison of influencing user factors / Teresa Brell, Hannah Biermann, Ralf Philipsen, and Martina Ziefle
Privacy preserving system for real-time enriched integrated service with feedback to providers / Kaisei Kajita, Kazuto Ogawa, and Go Ohtake
The automatic detection of sensitive data in smart homes / Mahsa Keshavarz and Mohd Anwar
Privacy preservation for versatile pay-TV services / Kazuto Ogawa and Koji Nuida
Company privacy dashboards : employees needs and requirements / Svenja Polst, Patricia Kelbert, and Denis Feth
Privacy and power implications of web location of personal data authenticators / Kirsten E. Richards
Trust in automated software repair : the effects of repair source, transparency, and programmer experience on perceived trustworthiness and trust / Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose Gamble, Sarah A. Jessup, August Capiola, and Marc D. Pfahler
Measuring network user trust via mouse behavior characteristics under different emotions / Biao Wang, Shiquan Xiong, Shuping Yi, Qian Yi, and Fangfei Yan.
Consonant-vowel-consonant for error-free code entry / Nikola K. Blanchard, Leila Gabasova, and Ted Selker
Two-factor authentication using leap motion and numeric keypad / Tomoki Manabe and Hayato Yamana
Identity verification using face recognition for artificial-intelligence electronic forms with speech interaction / Akitoshi Okumura, Shuji Komeiji, Motohiko Sakaguchi, Masahiro Tabuchi, and Hiroaki Hattori
BREAKING : password entry is fine / Catlin Pidel and Stephan Neuhaus
Explore-a-nation : combining graphical and alphanumeric authentication / Lauren N. Tiller, Catherine A. Angelini, Sarah C. Leibner, and Jeremiah D. Still.
[II]. Cybersecurity awareness and behavior: From cyber-security deception to manipulation and gratification through gamification / Xavier Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, and Robert Atkinson
Gamifying security awareness : a new prototype / John Russell Cole, Toni Pence, Jeffrey Cummings, and Elizabeth Baker
Alertin users about phishing attacks / Giuseppe Desolda, Francesco Di Nocera, Lauren Ferro, Rosa Lanzilotti, Piero Maggi, and Andrea Marrella
Social preferences in decision making under cybersecurity risks and uncertainties / Mazaher Kianpour, Harald Øverby, Stewart James Kowalski, and Christopher Frantz
Understanding perceptions : user responses to browser warning messages / Heather Molyneaux, Irina Kondratova, and Elizabeth Stobert
Understanding parents' concerns with smart device usage in the home / Aarathi Prasad, Ruben Ruiz, and Timothy Stablein
Gamification techniques for raising cyber security awareness / Sam Scholefield and Lynsay A. Shepherd
An identification method of untrusted interactive behavior in ERP system based on Markov chain / Mengyao Xu, Qian Yi, Shuping Yi, and Shiquan Xiong.
[III]. Security and usability: A framework of information security integrated with human factors / Ahmed I. Al-Darwish and Pilsung Choe
Making sense of Darknet markets : automatic inference of emantic classifications from unconventional multimedia datasets / Alexander Berman and Celeste Lyn Paul
Policy creation for enterprise-level data sharing / Linda Briesemeister, Woodrow Gustafson, Grit Denker, April Martin, Karsten Martiny, Ron Moore, Dusko Pavlovic, and Mark St. John
Classification of web history tools through web analysis / João Rafael Gonçalves Evangelista, Dacyr Dante de Oliveira Gatto, and Renato José Sassi
Investigating visualisation techniques for rapid triage of digital forensic evidence / Gavin Hales and Ethan Bayne
Behind the façade : paradigms in ubiquitous cryptography / Aaron MacSween and Yann Flory
Interdependencies, conflicts and trade-offs between security and usability : why and how should we engineer them? / Bilal Naqvi and Ahmed Seffah
Informing hybrid system design in cyber security incident response / Megan Nyre-Yu, Kelly A. Sprehn, and Barrett S. Caldwell
Revolutionizing the visual design of capture the flag (CTF) competitions / Rukman Senanayake, Phillip Porras, and Jason Kaehler.
[IV]. Privacy and trust: Reciprocities or incentives? Understanding privacy intrusion perspectives and sharing behaviors / Ala Sarah Alaqra and Erik Wästlund
Trust in autonomous technologies : a contextual comparison of influencing user factors / Teresa Brell, Hannah Biermann, Ralf Philipsen, and Martina Ziefle
Privacy preserving system for real-time enriched integrated service with feedback to providers / Kaisei Kajita, Kazuto Ogawa, and Go Ohtake
The automatic detection of sensitive data in smart homes / Mahsa Keshavarz and Mohd Anwar
Privacy preservation for versatile pay-TV services / Kazuto Ogawa and Koji Nuida
Company privacy dashboards : employees needs and requirements / Svenja Polst, Patricia Kelbert, and Denis Feth
Privacy and power implications of web location of personal data authenticators / Kirsten E. Richards
Trust in automated software repair : the effects of repair source, transparency, and programmer experience on perceived trustworthiness and trust / Tyler J. Ryan, Gene M. Alarcon, Charles Walter, Rose Gamble, Sarah A. Jessup, August Capiola, and Marc D. Pfahler
Measuring network user trust via mouse behavior characteristics under different emotions / Biao Wang, Shiquan Xiong, Shuping Yi, Qian Yi, and Fangfei Yan.