Skip to main content
  • Conference proceedings
  • © 2014

Human Aspects of Information Security, Privacy, and Trust

Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings

Conference proceedings info: HAS 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Usable Security

    1. Front Matter

      Pages 1-1
    2. On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security

      • Marios Belk, Christos Fidas, Panagiotis Germanakos, George Samaras
      Pages 3-10
    3. A Network Telescope for Early Warning Intrusion Detection

      • Panos Chatziadam, Ioannis G. Askoxylakis, Alexandros Fragkiadakis
      Pages 11-22
    4. Visualization of System Log Files for Post-incident Analysis and Response

      • John Haggerty, Thomas Hughes-Roberts
      Pages 23-32
    5. An Assessment Framework for Usable-Security Based on Decision Science

      • Yasser M. Hausawi, William H. Allen
      Pages 33-44
    6. An Image-Based CAPTCHA Using Sophisticated Mental Rotation

      • Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki
      Pages 57-68
    7. What Usable Security Really Means: Trusting and Engaging Users

      • Iacovos Kirlappos, M. Angela Sasse
      Pages 69-78
    8. QR Code Security: A Survey of Attacks and Challenges for Usable Security

      • Katharina Krombholz, Peter Frühwirt, Peter Kieseberg, Ioannis Kapsalis, Markus Huber, Edgar Weippl
      Pages 79-90
    9. Discrete Hardware Apparatus and Method for Mobile Application and Communication Security

      • Paschalis Papagrigoriou, Anargyros Plemenos, Ioannis G. Askoxylakis
      Pages 102-112
  3. Authentication and Passwords

    1. Front Matter

      Pages 113-113
    2. Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method

      • Panagiotis Andriotis, Theo Tryfonas, George Oikonomou
      Pages 115-126
    3. Do Graphical Authentication Systems Solve the Password Memorability Problem?

      • Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie
      Pages 138-148
    4. E-voting Authentication with QR-codes

      • Stefanie Falkner, Peter Kieseberg, Dimitris E. Simos, Christina Traxler, Edgar Weippl
      Pages 149-159
    5. I Can’t Type That! P@$$w0rd Entry on Mobile Devices

      • Kristen K. Greene, Melissa A. Gallagher, Brian C. Stanton, Paul Y. Lee
      Pages 160-171
    6. ACCESS: Describing and Contrasting

      • Karen Renaud, Melanie Volkamer, Joseph Maguire
      Pages 183-194

Other Volumes

  1. Human Aspects of Information Security, Privacy, and Trust

About this book

This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.

Editors and Affiliations

  • Cryptography Group, University of Bristol, Bristol, UK

    Theo Tryfonas

  • Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Heraklion, Greece

    Ioannis Askoxylakis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access