Human Aspects of Information Security, Privacy, and Trust (Record no. 182966)

MARC details
000 -LEADER
fixed length control field 05469nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-319-39381-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125915.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160620s2016 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319393810
-- 978-3-319-39381-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-39381-0
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA75.5-76.95
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYA
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM014000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYA
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.0151
Edition number 23
245 10 - TITLE STATEMENT
Title Human Aspects of Information Security, Privacy, and Trust
Medium [electronic resource] :
Remainder of title 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings /
Statement of responsibility, etc edited by Theo Tryfonas.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2016.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 289 p. 83 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Information Systems and Applications, incl. Internet/Web, and HCI,
International Standard Serial Number 2946-1642 ;
Volume number/sequential designation 9750
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note User Identification Using Games -- Hermes: Hands-Free Authentication in Physical Spaces -- Implicit Authentication for Mobile Devices Using Typing Behavior -- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials -- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices -- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud -- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011 -- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks -- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia’s Personal Health Information Act -- Information Security Application Design: Understanding Your Users -- Responsibility Modelling and Its Application Trust Management -- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks -- Current Trend of End-users’ Behaviors towards Security Mechanisms -- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology -- The Impact of Security Cues on User Perceived Security in E-Commerce -- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks -- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective -- Assessing the Feasibility of Adaptive Security Models for the Internet of Things -- OpenStack Firewall as a Service Rule Analyser -- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes -- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle -- The State of Near-Field Communication (NFC) on the Android platform -- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home -- A Taxonomy to Classify Risk End-user Profile in Interactionwith the Computing Environment -- Security Middleware Programming Using P4.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the proceedings of the 4th International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2016, held as part of the 18th International Conference on Human-Computer Interaction, HCII 2016, held in Toronto, ON, Canada, in July 2016 and received a total of 4354 submissions, of which 1287 papers were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 25 papers presented in the HAS 2016 proceedings are organized in topical sections as follows: human factors of authentication; security, privacy, and human behavior; and security technologies.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element User interfaces (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Human-computer interaction.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information storage and retrieval systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Models of Computation.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element User Interfaces and Human Computer Interaction.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element IT Operations.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Storage and Retrieval.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tryfonas, Theo.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319393803
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783319393827
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Information Systems and Applications, incl. Internet/Web, and HCI,
-- 2946-1642 ;
Volume number/sequential designation 9750
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in