000 | 04161nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-319-20376-8 | ||
003 | DE-He213 | ||
005 | 20210120143403.0 | ||
007 | cr nn 008mamaa | ||
008 | 150720s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319203768 _9978-3-319-20376-8 |
||
024 | 7 |
_a10.1007/978-3-319-20376-8 _2doi |
|
050 | 4 | _aQA75.5-76.95 | |
072 | 7 |
_aUY _2bicssc |
|
072 | 7 |
_aCOM069000 _2bisacsh |
|
072 | 7 |
_aUY _2thema |
|
082 | 0 | 4 |
_a005.743 _223 |
245 | 1 | 0 |
_aHuman Aspects of Information Security, Privacy, and Trust _h[electronic resource] : _bThird International Conference, HAS 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015. Proceedings / _cedited by Theo Tryfonas, Ioannis Askoxylakis. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXVIII, 719 p. 206 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI ; _v9190 _aLecture Notes in Computer Science _v9190 |
|
505 | 0 | _aAuthentication -- Cybersecurity -- Privacy, security and user behaviour -- Security in social media and smart technologies -- Security Technologies. | |
520 | _aThis book constitutes the proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015 and received a total of 4843 submissions, of which 1462 papers and 246 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 62 papers presented in the HAS 2015 proceedings are organized in topical sections as follows: authentication, cybersecurity, privacy, security, and user behavior, security in social media and smart technologies, and security technologies. | ||
650 | 0 | _aComputers. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aInformation technology. | |
650 | 0 | _aBusiness—Data processing. | |
650 | 1 | 4 |
_aModels and Principles. _0https://scigraph.springernature.com/ontologies/product-market-codes/I18016 |
650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0https://scigraph.springernature.com/ontologies/product-market-codes/I18040 |
650 | 2 | 4 |
_aComputer Communication Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
650 | 2 | 4 |
_aSoftware Engineering. _0https://scigraph.springernature.com/ontologies/product-market-codes/I14029 |
650 | 2 | 4 |
_aArtificial Intelligence. _0https://scigraph.springernature.com/ontologies/product-market-codes/I21000 |
650 | 2 | 4 |
_aIT in Business. _0https://scigraph.springernature.com/ontologies/product-market-codes/522000 |
700 | 1 |
_aTryfonas, Theo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAskoxylakis, Ioannis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319203775 |
776 | 0 | 8 |
_iPrinted edition: _z9783319203751 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI ; _v9190 |
|
830 | 0 |
_aLecture Notes in Computer Science ; _v9190 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-20376-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58074 _d58074 |