Human aspects of information security, privacy, and trust: second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8533 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-92 DE-1051 DE-898 DE-859 DE-1049 DE-861 DE-91 DE-384 DE-473 DE-355 DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XXII, 448 S.) graph. Darst. |
ISBN: | 9783319076195 9783319076201 |
DOI: | 10.1007/978-3-319-07620-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041966860 | ||
003 | DE-604 | ||
005 | 20170406 | ||
007 | cr|uuu---uuuuu | ||
008 | 140710s2014 xx d||| o|||| 10||| eng d | ||
020 | |a 9783319076195 |9 978-3-319-07619-5 | ||
020 | |a 9783319076201 |c Online |9 978-3-319-07620-1 | ||
024 | 7 | |a 10.1007/978-3-319-07620-1 |2 doi | |
035 | |a (OCoLC)882492285 | ||
035 | |a (DE-599)BVBBV041966860 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-M347 |a DE-859 |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-91 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-861 |a DE-634 | ||
084 | |a DAT 610f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Human aspects of information security, privacy, and trust |b second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings |c Theo Tryfonas ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XXII, 448 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8533 | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 22.06.2017-27.06.2017 |z Iraklion |2 gnd-content | |
700 | 1 | |a Tryfonas, Theo |e Sonstige |0 (DE-588)1052203302 |4 oth | |
711 | 2 | |a HAS |n 2. |d 2014 |c Heraklion |j Sonstige |0 (DE-588)105219995X |4 oth | |
711 | 2 | |a HCI International |n 16. |d 2014 |c Heraklion |j Sonstige |0 (DE-588)105219253X |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 8533 |w (DE-604)BV014880109 |9 8533 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-07620-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027409586 | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-1051 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-1049 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-91 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-355 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-824 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-07620-1 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875580404400128 |
---|---|
adam_text |
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
USABLE SECURITY
ON SUPPORTING SECURITY AND PRIVACY-PRESERVING INTERACTION THROUGH
ADAPTIVE USABLE SECURITY
A NETWORK TELESCOPE FOR EARLY WARNING INTRUSION DETECTION
VISUALIZATION OF SYSTEM LOG FILES FOR POST-INCIDENT ANALYSIS AND
RESPONSE
AN ASSESSMENT FRAMEWORK FOR USABLE-SECURITY BASED ON DECISION SCIENCE
ON DESIGNING USABLE POLICY LANGUAGES FOR DECLARATIVE TRUST AGGREGATION
AN IMAGE-BASED CAPTCHA USING SOPHISTICATED MENTAL ROTATION
WHAT USABLE SECURITY REALLY MEANS: TRUSTING AND ENGAGING USERS
QR CODE SECURITY: A SURVEY OF ATTACKS AND CHALLENGES FOR USABLE SECURITY
DESIGNING MOBILE SECURITY APPS; A PARADIGM SHIFT: A USER EXPERIENCE CASE
STUDY WITH EMERGING MARKETS LIKE INDIA
DISCRETE HARDWARE APPARATUS AND METHOD FOR MOBILE APPLICATION AND
COMMUNICATION SECURITY
AUTHENTICATION AND PASSWORDS COMPLEXITY METRICS AND USER STRENGTH
PERCEPTIONS OF THE PATTERN-LOCK GRAPHICAL AUTHENTICATION METHOD
A COGNITIVE-BEHAVIORAL FRAMEWORK OF USER PASSWORD MANAGEMENT LIFECYCLE
DO GRAPHICAL AUTHENTICATION SYSTEMS SOLVE THE PASSWORD MEMORABILITY
PROBLEM
E-VOTING AUTHENTICATION WITH QR-CODES
I CAN’T TYPE THAT! P@ ^$$W0RD ENTRY ON MOBILE DEVICES
CAPTURING ATTENTION FOR WARNINGS ABOUT INSECURE PASSWORD FIELDS –
SYSTEMATIC DEVELOPMENT OF A PASSIVE SECURITY INTERVENTION
ACCESS: DESCRIBING AND CONTRASTING – AUTHENTICATION MECHANISMS
CHARACTER STRINGS, MEMORY AND PASSWORDS: WHAT A RECALL STUDY CAN TELL US
SECURITY POLICY AND AWARENESS
FROM REGULATIONS TO PRACTICE: ACHIEVING INFORMATION SECURITY COMPLIANCE
IN HEALTHCARE
RETHINKING THE SMART CARD TECHNOLOGY
COMPOSITIONAL SECURITY MODELLING: STRUCTURE, ECONOMICS, AND BEHAVIOUR
END USER DEVELOPMENT AND INFORMATION SECURITY CULTURE
DSAPE – DYNAMIC SECURITY AWARENESS PROGRAM EVALUATION
A CRITICAL REFLECTION ON THE THREAT FROM HUMAN INSIDERS – ITS NATURE,
INDUSTRY PERCEPTIONS, AND DETECTION APPROACHES
CHANGING FACES: IDENTIFYING COMPLEX BEHAVIOURAL PROFILES
HUMAN BEHAVIOUR IN CYBERSECURITY
A CONCEPTUAL FRAMEWORK TO ANALYZE HUMAN FACTORS OF INFORMATION SECURITY
MANAGEMENT SYSTEM (ISMS) IN ORGANIZATIONS
^ ^^$$WSOCIO-TECHNICAL SECURITY ANALYSIS OF WIRELESS HOTSPOTS
A CONCEPTUAL FRAMEWORK TO STUDY SOCIO-TECHNICAL SECURITY
AN EVALUATION OF BEHAVIOURAL PROFILING ON MOBILE DEVICES
NUDGING FOR QUANTITATIVE ACCESS CONTROL SYSTEMS
SOCIAL INFORMATION LEAKAGE: EFFECTS OF AWARENESS AND PEER PRESSURE ON
USER BEHAVIOR
THE CURIOUS INCIDENCE OF SECURITY BREACHES BY KNOWLEDGEABLE EMPLOYEES
AND THE PIVOTAL ROLE OF SECURITY CULTURE
PRIVACY ISSUES
USER ACCEPTANCE OF PRIVACY-ABCS: AN EXPLORATORY STUDY
“MY LIFE DOESN’T HAVE TO BE AN OPEN BOOK”: A MODEL TO HELP
DESIGNERS TO ENHANCE PRIVACY CONTROLS ON SOCIAL NETWORK SITES
PAPER AUDIT TRAILS AND VOTERS’ PRIVACY CONCERNS
MENTAL MODELS FOR USABLE PRIVACY: A POSITION PAPER
WEB PRIVACY POLICIES IN HIGHER EDUCATION: HOW ARE CONTENT AND DESIGN
USED TO PROVIDE NOTICE (OR A LACK THEREOF) TO USERS
PRIVACY PROTECTION BASED PRIVACY CONFLICT DETECTION AND SOLUTION IN
ONLINE SOCIAL NETWORKS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE SECOND INTERNATIONAL
CONFERENCE ON HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST,
HAS 2014, HELD AS PART OF HCI INTERNATIONAL 2014 WHICH TOOK PLACE IN
HERAKLION, CRETE, GREECE, IN JUNE 2014 AND INCORPORATED 14 CONFERENCES
WHICH SIMILAR THEMATIC AREAS. HCII 2014 RECEIVED A TOTAL OF 4766
SUBMISSIONS, OF WHICH 1476 PAPERS AND 220 POSTERS WERE ACCEPTED FOR
PUBLICATION AFTER A CAREFUL REVIEWING PROCESS. THESE PAPERS ADDRESS THE
LATEST RESEARCH AND DEVELOPMENT EFFORTS AND HIGHLIGHT THE HUMAN ASPECTS
OF DESIGN AND USE OF COMPUTING SYSTEMS. THE PAPERS THOROUGHLY COVER THE
ENTIRE FIELD OF HUMAN-COMPUTER INTERACTION, ADDRESSING MAJOR ADVANCES IN
KNOWLEDGE AND EFFECTIVE USE OF COMPUTERS IN A VARIETY OF APPLICATION
AREAS. THE 38 PAPERS PRESENTED IN THE HAS 2014 PROCEEDINGS ARE ORGANIZED
IN TOPICAL SECTIONS NAMED: USABLE SECURITY; AUTHENTICATION AND
PASSWORDS; SECURITY POLICY AND AWARENESS; HUMAN BEHAVIOUR IN CYBER
SECURITY AND PRIVACY ISSUES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1052203302 |
building | Verbundindex |
bvnumber | BV041966860 |
classification_rvk | SS 4800 |
classification_tum | DAT 610f DAT 461f DAT 050f |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)882492285 (DE-599)BVBBV041966860 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-07620-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041966860</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170406</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140710s2014 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319076195</subfield><subfield code="9">978-3-319-07619-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319076201</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-07620-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-07620-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)882492285</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041966860</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 610f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Human aspects of information security, privacy, and trust</subfield><subfield code="b">second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings</subfield><subfield code="c">Theo Tryfonas ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 448 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8533</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">22.06.2017-27.06.2017</subfield><subfield code="z">Iraklion</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tryfonas, Theo</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1052203302</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">HAS</subfield><subfield code="n">2.</subfield><subfield code="d">2014</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)105219995X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">HCI International</subfield><subfield code="n">16.</subfield><subfield code="d">2014</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)105219253X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8533</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8533</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027409586</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-1051</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-07620-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 22.06.2017-27.06.2017 Iraklion gnd-content |
genre_facet | Konferenzschrift 22.06.2017-27.06.2017 Iraklion |
id | DE-604.BV041966860 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:54Z |
institution | BVB |
institution_GND | (DE-588)105219995X (DE-588)105219253X |
isbn | 9783319076195 9783319076201 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027409586 |
oclc_num | 882492285 |
open_access_boolean | |
owner | DE-M347 DE-859 DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-91 DE-BY-TUM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-861 DE-634 |
owner_facet | DE-M347 DE-859 DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-91 DE-BY-TUM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-861 DE-634 |
physical | 1 Online-Ressource (XXII, 448 S.) graph. Darst. |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings Theo Tryfonas ... (eds.) Cham [u.a.] Springer 2014 1 Online-Ressource (XXII, 448 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8533 (DE-588)1071861417 Konferenzschrift 22.06.2017-27.06.2017 Iraklion gnd-content Tryfonas, Theo Sonstige (DE-588)1052203302 oth HAS 2. 2014 Heraklion Sonstige (DE-588)105219995X oth HCI International 16. 2014 Heraklion Sonstige (DE-588)105219253X oth Lecture notes in computer science 8533 (DE-604)BV014880109 8533 https://doi.org/10.1007/978-3-319-07620-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings Lecture notes in computer science |
subject_GND | (DE-588)1071861417 |
title | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings |
title_auth | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings |
title_exact_search | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings |
title_full | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings Theo Tryfonas ... (eds.) |
title_fullStr | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings Theo Tryfonas ... (eds.) |
title_full_unstemmed | Human aspects of information security, privacy, and trust second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings Theo Tryfonas ... (eds.) |
title_short | Human aspects of information security, privacy, and trust |
title_sort | human aspects of information security privacy and trust second international conference has 2014 held as part of hci international 2014 heraklio crete greece june 22 27 2014 proceedings |
title_sub | second International Conference, HAS 2014, held as part of HCI International 2014, Heraklio, Crete, greece, June 22-27, 2014 ; proceedings |
topic_facet | Konferenzschrift 22.06.2017-27.06.2017 Iraklion |
url | https://doi.org/10.1007/978-3-319-07620-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027409586&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT tryfonastheo humanaspectsofinformationsecurityprivacyandtrustsecondinternationalconferencehas2014heldaspartofhciinternational2014herakliocretegreecejune22272014proceedings AT hasheraklion humanaspectsofinformationsecurityprivacyandtrustsecondinternationalconferencehas2014heldaspartofhciinternational2014herakliocretegreecejune22272014proceedings AT hciinternationalheraklion humanaspectsofinformationsecurityprivacyandtrustsecondinternationalconferencehas2014heldaspartofhciinternational2014herakliocretegreecejune22272014proceedings |