You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019. The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.
The two-volume set LNCS 10286 + 10287 constitutes the refereed proceedings of the 8th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics, and Risk Management, DHM 2017, held as part of HCI International 2017 in Vancouver, BC, Canada. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 75 papers presented in these volumes were organized in topical sections as follows: Part I: anthropometry, ergonomics, design and comfort; human body and motion modelling; smart human-centered service system design; and human-robot interaction. Part II: clinical and health information systems; health and aging; health data analytics and visualization; and design for safety.
The articles included in this book reflect a diverse range of research and theoretical reflections on the Internet and information and communication technologies. The articles are grouped into four chapters reflecting the main areas of research interest, covering such topics as electronic government, electronic business modeling and programming, management information systems, and information and communication technologies in education. The book should prove useful to students, teachers, researchers, and scientists in helping them to acquire knowledge as well as to build new research plans in the field of internet and information technology.
The four-volume set CCIS 1580, CCIS 1581, CCIS 1582, and CCIS 1583 contains the extended abstracts of the posters presented during the 24th International Conference on Human-Computer Interaction, HCII 2022, which was held virtually in June - July 2022. The total of 1276 papers and 275 posters included in the 40 HCII 2021 proceedings volumes was carefully reviewed and selected from 5583 submissions. The posters presented in these four volumes are organized in topical sections as follows: Part I: user experience design and evaluation; visual design and visualization; data, information and knowledge; interacting with AI; universal access, accessibility and design for aging. Part II: multimodal and natural interaction; perception, cognition, emotion and psychophysiological monitoring; human motion modelling and monitoring; IoT and intelligent living environments. Part III: learning technologies; HCI, cultural heritage and art; eGovernment and eBusiness; digital commerce and the customer experience; social media and the metaverse. Part IV: virtual and augmented reality; autonomous vehicles and urban mobility; product and robot design; HCI and wellbeing; HCI and cybersecurity.
From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your resources to eliminate exposure and minimize risk. Top cybersecurity and compliance professionals from around the world share their decades of experience in utilizing data protection regulations and complete security measures to protect your company from fines, lawsuits, loss of revenue, operation disruption or destruction, intellectual property theft, and reputational damage. From Exposed To Secure delivers the crucial, smart steps every business must take to protect itself against the increasingly prevalent and sophisticated cyberthreats that can destroy your company – including phishing, the Internet of Things, insider threats, ransomware, supply chain, and zero-day.
Proceedings of the 15th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, Nice, France, 24-27 July 2024.
Imagine a Britain where the most important sites of historical significance are replaced with housing estates and supermarkets. Imagine a Britain without Bletchley Park, where Alan Turing and a team of codebreakers changed the course of World War II and where thousands of women inspired future generations with their work in the fields of computing and technology. Now imagine a group of extraordinary people, who--70 years after the birth of the modern computer at Bletchley Park--used technology to spark a social media campaign that helped secure its future and transform it into the world-class heritage and education center it deserves to be. This is a story about saving Bletchley Park. But it is also the story of the hundreds of people who dedicated 20 years of hard work and determination to the campaign that saved it. It is a testament to the remarkable and mysterious work during World War II that made it a place worth saving. It is a book about campaigners, veterans, enthusiasts, computer geeks, technology, Twitter, trees and Stephen Fry stuck in an elevator. And finally, it is a story about preserving the past for the generations of tomorrow.