Search Results - (((((( Human-school relationships ) OR ( Human-((social relationship) OR (social relations)) ))) OR ( Human-tribal nations ))) OR ( Human-fiscal relations ))

Refine Results
  1. 1

    Social, cultural, and behavioral modeling : 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18-21, 2020, proceedings by International Conference on Social Computing Behavioral-Cultural Modeling, and Prediction and Behavior Representation in Modeling and Simulation Online, SpringerLink (Online service)

    Published: Springer Nature Switzerland AG, 2020
    Description: 1 online resource (xv, 352 pages) : illustrations (some color).
    Subjects: “…Online social networks Psychological aspects Congresses.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  2. 2

    Advances in human factors in cybersecurity : proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA by International Conference on Human Factors in Cybersecurity Washington, D.C., SpringerLink (Online service)

    Published: Springer, 2020
    Description: 1 online resource.
    Contents: “…4 The Role of Management in Information Security Administration5 Conclusion; References; Beyond Passwords: Enforcing Username Security as the First Line of Defense; Abstract; 1 Introduction; 2 Related Work; 3 Human Factors in Username Practices; 3.1 Account Names Shown in Clear; 3.2 Social Exposure of Username; 3.3 Real-time Feedback About Duplicate Usernames; 3.4 E-mail Utilized as Account Name; 3.5 Account Names Based on Personal Information; 3.6 Account Name Reuse; 3.7 Strength Meters; 3.8 Enabling Account Name Change; 3.9 Forcing Account Name Expiration; 4 Study; 5 Results and Discussion.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  3. 3
  4. 4

    Human aspects of information security and assurance : 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings by International Symposium on Human Aspects of Information Security & Assurance Kent, England, SpringerLink (Online service)

    Published: Springer, 2023
    Description: 1 online resource (xii, 484 pages) : illustrations (some color).
    Contents: “…Testing the automaticity of verifying the sender's address -- Content analysis of persuasion princples in mobile instant message phishing -- Six-year study of emails sent to unverified addresses -- Social-Technical Factors -- Evaluating the risks of human factors associated with social media cybersecurity threats -- Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia -- To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks -- Analyzing cyber security definitions for non-experts -- On using the task models for validation and evolution of usable security design patterns -- Chatbots: a framework for improving information security behaviors using ChatGPT -- Factors influencing Internet of Medical Things (IoMT) cybersecurity protective behaviors among healthcare workers -- The influence of interpersonal factors on telecommuting employees' cybercrime preventative behaviors during the pandemic -- Research Methods -- A review of constructive alignment in information security educational research -- What goes around comes around; effects of unclear questionnaire items in information security research.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  5. 5
  6. 6

    Cyber defence in the age of AI, smart societies and augmented humanity by SpringerLink (Online service)

    Published: Springer, 2020
    Description: 1 online resource (viii, 450 pages).
    SpringerLink - Click here for access
    eBook
  7. 7

    Critical perspectives on cybersecurity : feminist and postcolonial interventions by Oxford Scholarship Online

    Published: Oxford University Press, 2024
    Description: 1 online resource.
    Oxford Scholarship online - Click here for access
    eBook
  8. 8

    ICT critical infrastructures and society : 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, the Netherlands, September 27-28, 2012. Pro... by IFIP TC9 World Conference on Human Choice and Computers Amsterdam, Netherlands, SpringerLink (Online service)

    Published: Springer, 2012
    Description: 1 online resource.
    Contents: “…Information Inadequacy: The Lack of Needed Information in Human, Social and Industrial Affairs /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 9

    Privacy and security by Films for the Humanities & Sciences (Firm), Infobase, Fred Friendly Seminars (Firm)

    Published: Infobase, 2005
    Description: 1 streaming video file (57 min.) : sd., col., digital file + instructional materials (online)
    Films on Demand - Click here for access
    Video
  10. 10

    Trust Management IV : 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010 : proceedings by IFIPTM (Conference) Morioka-shi, Japan), SpringerLink (Online service)

    Published: Springer, 2010
    Description: 1 online resource (xii, 276 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  11. 11

    Security and privacy in biometrics by SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  12. 12

    Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013, proceedings by PAISI (Workshop) Beijing, China), SpringerLink (Online service)

    Published: Springer, 2013
    Description: 1 online resource (x, 115 pages) : illustrations.
    Contents: “…Region of Interest Discovery in Location-Based Social Networking Services with Protected Locations /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  13. 13

    Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings by ACNS (Conference) Guildford, England), SpringerLink (Online service)

    Published: Springer, 2016
    Description: 1 online resource (xiv, 668 pages) : illustrations.
    SpringerLink - Click here for access
    Conference Proceeding eBook
  14. 14
  15. 15
  16. 16

    Information security and assurance : International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings by International Conference on Information Security and Assurance Brno, Czech Republic, SpringerLink (Online service)

    Published: Springer, 2011
    Description: 1 online resource (xiv, 406 pages) : illustrations.
    Contents: “…Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment /…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 17
  18. 18

    HCI for cybersecurity, privacy and trust : third International Conference, HCI-CPT 2021, held as part of the 23rd HCI International Conference, HCII 2021, Virtual event, July 24-29... by HCI for Cybersecurity, Privacy and Trust (Conference) Online), SpringerLink (Online service), International Conference on Human-Computer Interaction

    Published: Springer, 2021
    Description: 1 online resource (xix, 490 pages) : illustrations.
    Contents: “…-- Development of a Novice-Friendly Representation of Camouflaged Boolean Networks -- Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review -- Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes -- Risk Assessment of "Ostrich ZIP" -- Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users -- Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services -- Security and Privacy by Design -- Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience -- A Human Factor Approach to Threat Modeling -- Smart Technologies and Internet of Things Designed for Aging in Place -- Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration -- Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces -- Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk -- Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior -- Privacy Design Strategies and the GDPR: A Systematic Literature Review -- User Behavior Analysis in Cybersecurity -- 'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure -- Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices -- Perceptions of Security and Privacy in mHealth -- Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account -- CyberPin -- Challenges on Recognizing Youngest Cyber Talents -- It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness -- Understanding the Last Line of Defense: Human Response to Cybersecurity Events -- Security and Privacy Awareness -- The Effectiveness of Video Messaging Campaigns to Use 2FA -- A Study on Online Businesses' Commitment to Consumer Privacy -- Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks -- Social Engineering Attacks: Recent Advances and Challenges -- Brand Validation: Security Indicator to Better Indicate Website Identity -- Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials -- Gaming Apps' and Social Media Partnership: A Privacy Perspective.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  19. 19

    Artificial intelligence and national security by SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  20. 20

    Privacy, security, and trust within the context of pervasive computing by SpringerLink (Online service)

    Published: Springer, 2005
    Description: 1 online resource (viii, 167 pages) : illustrations.
    Contents: “…Terpstra -- Exploring the relationship between context and privacy / Timo Heiber, Pedro Jose Marron -- Privacy, security and trust issues raided by the personal server concept / John Light [and others] -- The role of identity in pervasive computational trust / Jean-Marc Seigneur, Christian Damsgaard Jensen -- Towards a next-generation trust management infrastructure for open computing systems / Yucel Karabulut -- Research directions for trust and security in human-centric computing / Sadie Creese [and others] -- User-centric identity management in open mobile environments / Mario Hoffmann -- Pre-authentication using infrared / Amir Spahic [and others] -- Architecture and protocol for authorized transient control / Philip Robinson -- Maintaining privacy in RFID enabled environments / Sarah Spiekermann, Iliver Berthold -- Safeguarding personal data using trusted computing in pervasive computing / Adolf Hohl, Alf Zugenmaier -- A social approach to privacy in location-enhanced computing / Ian Smith [and others].…”
    SpringerLink - Click here for access
    eBook