Skip to main content
  • Conference proceedings
  • © 2014

Human Aspects of Information Security, Privacy, and Trust

Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings

Conference proceedings info: HAS 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Authentication and Passwords

    1. Character Strings, Memory and Passwords: What a Recall Study Can Tell Us

      • Brian C. Stanton, Kristen K. Greene
      Pages 195-206
  2. Security Policy and Awareness

    1. Front Matter

      Pages 207-207
    2. From Regulations to Practice: Achieving Information Security Compliance in Healthcare

      • Subrata Acharya, Brian Coats, Arpit Saluja, Dale Fuller
      Pages 209-220
    3. Rethinking the Smart Card Technology

      • Raja Naeem Akram, Konstantinos Markantonakis
      Pages 221-232
    4. Compositional Security Modelling

      • Tristan Caulfield, David Pym, Julian Williams
      Pages 233-245
    5. End User Development and Information Security Culture

      • Fredrik Karlsson, Karin Hedström
      Pages 246-257
    6. DSAPE – Dynamic Security Awareness Program Evaluation

      • Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, George Hatzivasilis
      Pages 258-269
    7. A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches

      • Jason R. C. Nurse, Philip A. Legg, Oliver Buckley, Ioannis Agrafiotis, Gordon Wright, Monica Whitty et al.
      Pages 270-281
    8. Changing Faces: Identifying Complex Behavioural Profiles

      • Giles Oatley, Tom Crick
      Pages 282-293
  3. Human Behaviour in Cybersecurity

    1. Front Matter

      Pages 295-295
    2. Socio-technical Security Analysis of Wireless Hotspots

      • Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini
      Pages 306-317
    3. A Conceptual Framework to Study Socio-Technical Security

      • Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini
      Pages 318-329
    4. An Evaluation of Behavioural Profiling on Mobile Devices

      • Fudong Li, Ross Wheeler, Nathan Clarke
      Pages 330-339
    5. Nudging for Quantitative Access Control Systems

      • Charles Morisset, Thomas Groß, Aad van Moorsel, Iryna Yevseyeva
      Pages 340-351
    6. Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior

      • Mariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh et al.
      Pages 352-360
  4. Privacy Issues

    1. Front Matter

      Pages 373-373
    2. User Acceptance of Privacy-ABCs: An Exploratory Study

      • Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, Yannis Stamatiou
      Pages 375-386

Other Volumes

  1. Human Aspects of Information Security, Privacy, and Trust

About this book

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Editors and Affiliations

  • Cryptography Group, University of Bristol, Bristol, UK

    Theo Tryfonas

  • Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Heraklion, Greece

    Ioannis Askoxylakis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access