Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
17
views
10
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,864
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Human Aspects of Information Security, Privacy, and Trust
User Acceptance of Privacy-ABCs: An Exploratory Study
other
Author(s):
Zinaida Benenson
,
Anna Girard
,
Ioannis Krontiris
,
Vassia Liagkou
,
Kai Rannenberg
,
Yannis Stamatiou
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Most cited references
10
Record
: found
Abstract
: not found
Article
: not found
User acceptance of information technology: system characteristics, user perceptions and behavioral impacts
Fred D. Davis
(1993)
0
comments
Cited
554
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model
(2014)
0
comments
Cited
395
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Engineering Privacy
S Spiekermann
,
L.F. Cranor
(2009)
0
comments
Cited
46
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 375-386
DOI:
10.1007/978-3-319-07620-1_33
SO-VID:
7a6cf466-c86d-49fd-8fcd-34a13b1f735a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security
pp. 11
A Network Telescope for Early Warning Intrusion Detection
pp. 23
Visualization of System Log Files for Post-incident Analysis and Response
pp. 33
An Assessment Framework for Usable-Security Based on Decision Science
pp. 45
On Designing Usable Policy Languages for Declarative Trust Aggregation
pp. 57
An Image-Based CAPTCHA Using Sophisticated Mental Rotation
pp. 69
What Usable Security Really Means: Trusting and Engaging Users
pp. 79
QR Code Security: A Survey of Attacks and Challenges for Usable Security
pp. 91
Designing Mobile Security Apps; a Paradigm Shift: A User Experience Case Study with Emerging Markets like India
pp. 102
Discrete Hardware Apparatus and Method for Mobile Application and Communication Security
pp. 115
Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method
pp. 127
A Cognitive-Behavioral Framework of User Password Management Lifecycle
pp. 138
Do Graphical Authentication Systems Solve the Password Memorability Problem?
pp. 149
E-voting Authentication with QR-codes
pp. 160
I Can’t Type That! P@$$w0rd Entry on Mobile Devices
pp. 172
Capturing Attention for Warnings about Insecure Password Fields – Systematic Development of a Passive Security Intervention
pp. 183
ACCESS: Describing and Contrasting
pp. 195
Character Strings, Memory and Passwords: What a Recall Study Can Tell Us
pp. 209
From Regulations to Practice: Achieving Information Security Compliance in Healthcare
pp. 221
Rethinking the Smart Card Technology
pp. 233
Compositional Security Modelling
pp. 246
End User Development and Information Security Culture
pp. 258
DSAPE – Dynamic Security Awareness Program Evaluation
pp. 270
A Critical Reflection on the Threat from Human Insiders – Its Nature, Industry Perceptions, and Detection Approaches
pp. 282
Changing Faces: Identifying Complex Behavioural Profiles
pp. 297
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations
pp. 306
Socio-technical Security Analysis of Wireless Hotspots
pp. 318
A Conceptual Framework to Study Socio-Technical Security
pp. 330
An Evaluation of Behavioural Profiling on Mobile Devices
pp. 340
Nudging for Quantitative Access Control Systems
pp. 352
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior
pp. 361
The Curious Incidence of Security Breaches by Knowledgeable Employees and the Pivotal Role a of Security Culture
pp. 375
User Acceptance of Privacy-ABCs: An Exploratory Study
pp. 387
"My Life Doesn’t Have to Be an Open Book": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites
pp. 400
Paper Audit Trails and Voters’ Privacy Concerns
pp. 410
Mental Models for Usable Privacy: A Position Paper
pp. 422
Web Privacy Policies in Higher Education: How Are Content and Design Used to Provide Notice (Or a Lack Thereof) to Users?
pp. 433
Privacy Protection Based Privacy Conflict Detection and Solution in Online Social Networks
Similar content
2,864
How to design browser security and privacy alerts
Authors:
Karen Renaud
,
Lynsay A. Shepherd
Thoracic combined spinal epidural anaesthesia for exploratory laparoscopy and laparotomy (sigmoidectomy, colostomy): The first case in Palestine for the ASA5 patient
Authors:
Samah A Maree
,
Anoud Jadou
,
Mahmoud R Manasra
…
Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System
Authors:
Xirong Ma
,
Chuan Li
,
Yuchang Hu
…
See all similar
Cited by
3
Enhancing Privacy Controls for Patients via a Selective Authentic Electronic Health Record Exchange Service: Qualitative Study of Perspectives by Medical Professionals and Patients
Authors:
Ala Alaqra
,
Simone Fischer-Hübner
,
Erik Framner
Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication
Authors:
Ravi Kuber
,
Adam Aviv
On the User Acceptance of Privacy-Preserving Attribute-Based Credentials – A Qualitative Study
Authors:
Ahmad Sabouri
See all cited by