↓ Skip to main content

HCI for Cybersecurity, Privacy and Trust

Overview of attention for book
Cover of 'HCI for Cybersecurity, Privacy and Trust'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Awareness and Working Knowledge of Secure Design Principles: A User Study
  3. Altmetric Badge
    Chapter 2 The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR)
  4. Altmetric Badge
    Chapter 3 Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?
  5. Altmetric Badge
    Chapter 4 Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machine Interface Design
  6. Altmetric Badge
    Chapter 5 Building Connections for a Secure User Experience
  7. Altmetric Badge
    Chapter 6 Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviour Change?
  8. Altmetric Badge
    Chapter 7 Analyzing Cybersecurity Understanding Using a Brain Computer Interface
  9. Altmetric Badge
    Chapter 8 Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour
  10. Altmetric Badge
    Chapter 9 Another Week at the Office (AWATO) – An Interactive Serious Game for Threat Modeling Human Factors
  11. Altmetric Badge
    Chapter 10 Not Annoying the User for Better Password Choice: Effect of Incidental Anger Emotion on Password Choice
  12. Altmetric Badge
    Chapter 11 Development of a Test Battery for Cyber Soldiers
  13. Altmetric Badge
    Chapter 12 “Trust Me, You Will Need It”: Cybersecurity as Extracurricular Subject at Estonian Schools
  14. Altmetric Badge
    Chapter 13 Security Matters … Until Something Else Matters More: Security Notifications on Different Form Factors
  15. Altmetric Badge
    Chapter 14 A New Hope: Human-Centric Cybersecurity Research Embedded Within Organizations
  16. Altmetric Badge
    Chapter 15 Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?
  17. Altmetric Badge
    Chapter 16 Whose Risk Is It Anyway: How Do Risk Perception and Organisational Commitment Affect Employee Information Security Awareness?
  18. Altmetric Badge
    Chapter 17 The Man in the Besieged Castle: Heuristic Evaluation of Home Security Systems
  19. Altmetric Badge
    Chapter 18 Natural vs. Technical Language Preference and Their Impact on Firewall Configuration
  20. Altmetric Badge
    Chapter 19 Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce
  21. Altmetric Badge
    Chapter 20 To Allow, or Deny? That is the Question
  22. Altmetric Badge
    Chapter 21 “Alexa, Are You Spying on Me?”: Exploring the Effect of User Experience on the Security and Privacy of Smart Speaker Users
  23. Altmetric Badge
    Chapter 22 Clearing the Hurdles: How to Design Privacy Nudges for Mobile Application Users
  24. Altmetric Badge
    Chapter 23 Modelling and Presentation of Privacy-Relevant Information for Internet Users
  25. Altmetric Badge
    Chapter 24 Enabling Medical Research Through Privacy-Preserving Data Markets
  26. Altmetric Badge
    Chapter 25 Understanding Users’ Relationship with Voice Assistants and How It Affects Privacy Concerns and Information Disclosure Behavior
  27. Altmetric Badge
    Chapter 26 Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges
  28. Altmetric Badge
    Chapter 27 Multi-method Approach Measuring Trust, Distrust, and Suspicion in Information Technology
  29. Altmetric Badge
    Chapter 28 Did I Agree to This? Silent Tracking Through Beacons
  30. Altmetric Badge
    Chapter 29 Perspectives on Information Technology Artefacts in Trust-Related Interactions
  31. Altmetric Badge
    Chapter 30 Mental Model Mapping Method for Cybersecurity
  32. Altmetric Badge
    Chapter 31 Parents Unwittingly Leak Their Children’s Data: A GDPR Time Bomb?
  33. Altmetric Badge
    Chapter 32 An Emerging Strategy for Privacy Preserving Databases: Differential Privacy
  34. Altmetric Badge
    Chapter 33 Personal Data Discoverability to Human Searchers: Observations on Personal Data Availability
  35. Altmetric Badge
    Chapter 34 Understanding Privacy and Trust in Smart Home Environments
  36. Altmetric Badge
    Chapter 35 Privacy Apps for Smartphones: An Assessment of Users’ Preferences and Limitations
  37. Altmetric Badge
    Chapter 36 Cyberspace and Cyberculture: The New Social and Governance Field
  38. Altmetric Badge
    Chapter 37 Evaluation of Secure Pad Resilient to Shoulder Hacking
  39. Altmetric Badge
    Chapter 38 Smart Assistants in IT Security – An Approach to Addressing the Challenge by Leveraging Assistants’ Specific Features
  40. Altmetric Badge
    Chapter 39 An Improved Method of Time-Frequency Joint Analysis of Mouse Behavior for Website User Trustworthy Authentication
  41. Altmetric Badge
    Chapter 40 Cyber Security Threats and Incidents in Industrial Control Systems
  42. Altmetric Badge
    Chapter 41 Usable Security by Design: A Pattern Approach
  43. Altmetric Badge
    Chapter 42 Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks
  44. Altmetric Badge
    Chapter 43 Predicting Tap Locations on Touch Screens in the Field Using Accelerometer and Gyroscope Sensor Readings
  45. Altmetric Badge
    Chapter 44 Private Cloud Storage: Client-Side Encryption and Usable Secure Utility Functions
  46. Altmetric Badge
    Chapter 45 Time-Lapse Detection for Evolution of Trustworthy Network User Operation Behavior Using Bayesian Network
Attention for Chapter 15: Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Sleeping with the Enemy: Does Depletion Cause Fatigue with Cybersecurity?
Chapter number 15
Book title
HCI for Cybersecurity, Privacy and Trust
Published by
Springer, Cham, July 2020
DOI 10.1007/978-3-030-50309-3_15
Book ISBNs
978-3-03-050308-6, 978-3-03-050309-3
Authors

Andrew Reeves, Dragana Calic, Paul Delfabbro, Reeves, Andrew, Calic, Dragana, Delfabbro, Paul

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 2 22%
Professor 1 11%
Researcher 1 11%
Student > Doctoral Student 1 11%
Unknown 4 44%
Readers by discipline Count As %
Computer Science 2 22%
Social Sciences 2 22%
Agricultural and Biological Sciences 1 11%
Engineering 1 11%
Unknown 3 33%