This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.Your computer, email account or data is hacked into and your identity is stolen Your computer, email account or data is hacked ... a#39;snoopsa#39; on your communication Your employer a#39;snoopsa#39; on your communication A neighbour a#39; hacksa#39; into your WiFi to use your broadband 10. ... 2.3 Password Metrication In order to metricise the quality of passwords we focused on assessing the quality of the password in theanbsp;...
|Title||:||Human Aspects of Information Security, Privacy and Trust|
|Author||:||Louis Marinos, Ioannis Askoxylakis|
|Publisher||:||Springer - 2013-07-01|