This book represents the proceedings from the information security multi-conference (EISMC). All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.
The Human Aspects of Information Security and Assurance (HAISA) symposium specifically addresses information security issues that relate to people. It concerns the methods that inform and guide users' understanding of security, and the technologies that can benefit and support them in achieving protection. This book represents the proceedings from the 2016 event, which was held in Frankfurt, Germany. A total of 27 reviewed papers are included, spanning a range of topics including the communication of risks to end-users, user-centred security in system development, and technology impacts upon personal privacy. All of the papers were subject to double-blind peer review, with each being reviewed by at least two members of the international programme committee.
Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices.
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a wealth of topics, including methods for human training, novel Cyber-Physical and Process-Control Systems, social, economic and behavioral aspects of the cyberspace, issues concerning the cyber security index, security metrics for enterprises, risk evaluation, and many others. Based on the AHFE 2016 International Conference on Human Factors in Cybersecurity, held on July 27-31, 2016, in Walt Disney World®, Florida, USA, this book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems and future challenges that may be coped with through the help of human factors research.
This book addresses the needs of researchers who want to conduct surveys online. Issues discussed include sampling from online populations, developing online and mobile questionnaires, and administering electronic surveys, are unique to digital surveys. Others, like creating reliable and valid survey questions, data analysis strategies, and writing the survey report, are common to all survey environments. This single resource captures the particulars of conducting digital surveys from start to finish
This two-volume set constitutes the refereed proceedings of the 15th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2021, held as part of the 23rd International Conference, HCI International 2021, held as a virtual event, in July 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. UAHCI 2021 includes a total of 84 papers; they focus on topics related to universal access methods, techniques and practices, studies on accessibility, design for all, usability, UX and technology acceptance, emotion and behavior recognition for universal access, accessible media, access to learning and education, as well universal access to virtual and intelligent assistive environments.
This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20–21, 2021. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
This book constitutes the refereed proceedings of the 13th International Conference on Augmented Cognition, AC 2019, held as part of the 21st International Conference on Human-Computer Interaction, HCII 2019, in Orlando, FL, USA in July, 2019. The 1274 full papers and 209 posters presented at the HCII 2019 conferences were carefully reviewed and selected from 5029 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: cognitive modeling, perception, emotion and interaction; human cognition and behavior in complex tasks and environments; brain-computer interfaces and electroencephalography; and augmented learning.
As the Web grows and expands into ever more remote parts of the world, the availability of resources over the Internet increases exponentially. Making use of this widely prevalent tool, organizations and individuals can share and store knowledge like never before. Cloud Technology: Concepts, Methodologies, Tools, and Applications investigates the latest research in the ubiquitous Web, exploring the use of applications and software that make use of the Internets anytime, anywhere availability. By bringing together research and ideas from across the globe, this publication will be of use to computer engineers, software developers, and end users in business, education, medicine, and more.