We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Legal Protection for the Personal Data in Indonesia and Malaysia

    Rapid globalization in Indonesia has led to the growth of the information technology sector, which has an impact on individuals and global economic...
    Nanik Prasetyoningsih, Nazli Ismail Nawang, ... Muhammad Nur Rifqi Amirullah in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  2. To Bot or Not to Bot?: Analysing Mental Health Data Disclosures

    Disclosure of personal information about wellbeing and mental health is a nuanced situation requiring trust between agents. Current methods for...
    Deborah Taylor, Clare Melvin, ... Rameez Asif in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  3. Are UK Parents Empowered to Act on Their Cybersecurity Education Responsibilities?

    The UK government responsibilizes its citizens to take care of their own cybersecurity. They provide extensive advice but no other direct support...
    Suzanne Prior, Karen Renaud in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  4. Using a Digital Transformation to Improve Enterprise Security—A Case Study

    In this case study, I review a specific digital transformation of the Hawai‘i State Department of Education (HIDOE), over the time period from...
    David Brookshire Conner in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  5. Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data

    Biometric data is personal information, which leads to the psychological resistance of the user. Using biometric-based FIDO authentication eliminates...
    Takumi Takaiwa, Shinnosuke Nozaki, ... Masakatsu Nishigaki in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  6. Revolutionizing Social Engineering Awareness Raising, Education and Training: Generative AI-Powered Investigations in the Maritime Domain

    Innovation in generative Artificial Intelligence (AI) has already been leveraged by cybercriminals to deliver AI-powered social engineering attacks,...
    Michail Loupasakis, Georgios Potamos, Eliana Stavrou in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  7. Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany

    Human factors play a crucial role in the increasing number of information security incidents in the medical sector. European medical institutions,...
    Jan Tolsdorf, Luigi Lo Iacono in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  8. Paralyzed or Compromised: A Case Study of Decisions in Cyber-Physical Systems

    Human operators of Cyber-Physical Systems (CPSs) within Critical Infrastructure (CI) need to protect their systems from cyber-attacks. When CPSs are...
    Håvard Jakobsen Ofte, Sokratis Katsikas in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  9. Competencies Required for the Offensive Cyber Operations Planners

    This paper presents a systematic review of competencies required for Offensive Cyber Operations planners. Military Cyber Headquarters staff must...
    Marko Arik, Ricardo Gregorio Lugo, ... Adrian Nicholas Venables in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  10. “I’m not planning on dying anytime soon!”: A Survey of Digital Legacy Planning

    Increasing technology integration into daily life has broadened the concept of legacy to include the digital footprint individuals leave behind....
    Paola Marmorato, Clarissa Fernandes, ... Elizabeth Stobert in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  11. Why Do Organizations Fail to Practice Cyber Resilience?

    When organizations fall victim to cyber incidents, they are exposed to financial implications, data losses, and potential damage to their reputation....
    Rick van der Kleij, Tineke Hof in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  12. Enhancing Cyber Hygiene and Literacy via Interactive Mini-games

    Cyber threats are an increasingly reality for technology users in day-to-day use. As such, it is important to teach people how to protect themselves...
    Cameron Gray, Steven Furnell in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2024
  13. Performance Evaluation of LoRa in a Linear Deployment Scenario

    The Internet of Things (IoT) has become an essential daily field. This is mainly because of the advances in digital technologies, miniaturization,...
    Ass Diane, El Hadji Malick Ndoye, Ousmane Diallo in Ubiquitous Networking
    Conference paper 2024
  14. Data Balancing Process to Strengthen a Malaria Control Prediction System in Senegal

    Malaria is a public health problem in Senegal. Despite the implementation of prevention and treatment programs, the prevalence rate remains high,...
    Kodzo Parkoo, Bamba Gueye, ... Ibrahima Dia in Ubiquitous Networking
    Conference paper 2024
  15. Convergence of Blockchain Enabled Internet of Things (IoT) Framework: A Survey

    Recent research and experiments in the field of Internet of Things (IoT) security have found that these devices are vulnerable to various attacks,...
    Vatsala Upadhyay, Abhishek Vaish, J. Kokila in Ubiquitous Networking
    Conference paper 2024
  16. SE Based Development Framework for Changeable Maritime Systems

    Maritime vessels are complex systems that generate and require the utilization of large amounts of data for maximum efficiency. However, integrating...
    Conference paper 2024
  17. How to Support Knowledge Exchange in a Multi-division Manufacturing Firm Using a Prototype Platform?

    Knowledge management and intellectual capital are essential factors in a company's success. An intrinsic element of knowledge management is knowledge...
    Conference paper 2024
  18. A Digital Twin Framework for Industry 4.0/5.0 Technologies

    Industry 4.0 Paradigm unleashed tremendous opportunities to boost economical and societal transitions for the business and improved living standards...
    Conference paper 2024
  19. Derivation of Evacuation Routes to Avoid Narrow Road Adopting Physarum Solver

    Japan is a country where disasters occur frequently. When disasters occur, people need to escape from their homes to shelters immediately. Thus, it...
    Rei Fujiwara, Kayoko Yamamoto in Information Technology in Disaster Risk Reduction
    Conference paper 2024
  20. Performance Evaluation of Flood Level Estimation Method Using State-Space Model with Time-Series Monitoring Data

    This paper proposes a method for estimating flood levels using a state-space model in order to figure out the time-series changes at locations...
    Kei Hiroi, Akihito Kohiga, ... Yoichi Shinoda in Information Technology in Disaster Risk Reduction
    Conference paper 2024
Did you find what you were looking for? Share feedback.