Advances in human factors in cybersecurity : AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA

Bibliographische Detailangaben

Titel
Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
verantwortlich
Corradini, Isabella.; Nardelli, Enrico.; Ahram, Tareq Z.; International Conference on Advances in Human Factors in Cybersecurity (2020 : Online); International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online)
Schriftenreihe
Advances in Intelligent Systems and Computing ; ; v. 1219
veröffentlicht
Cham: Springer, 2020
Erscheinungsjahr
2020
Teil von
Advances in intelligent systems and computing ; ; 1219.
Medientyp
E-Book
Datenquelle
British National Bibliography
Tags
Tag hinzufügen

Zugang

Für diesen Titel können wir derzeit leider keine weiteren Informationen zur Verfügbarkeit bereitstellen.

LEADER 05984aam a22007451a 4500
001 180-019838014
003 Uk
005 20230220170527.0
006 m || d |
007 cr |||||||||||
008 200711s2020 sz o 101 0 eng d
015 |a GBC337854  |2 bnb 
020 |a 9783030525811  |q (electronic bk.) 
020 |a 3030525813  |q (electronic bk.) 
020 |z 9783030525804 
024 8 |a 10.1007/978-3-030-52 
037 |a com.springer.onix.9783030525811  |b Springer Nature 
040 |a EBLCP  |b eng  |c EBLCP  |d GW5XE  |d LQU  |d EBLCP  |d OCLCF  |d NLW  |d UKAHL  |d N$T  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO  |d OCLCQ  |d Uk  |e pn 
042 |a ukblsr 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
111 2 |a International Conference on Advances in Human Factors in Cybersecurity  |d (2020 :  |c Online) 
245 1 0 |a Advances in human factors in cybersecurity  |b AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA  |c Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors 
260 |a Cham  |b Springer  |c 2020 
300 |a 1 online resource (147 pages). 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
490 1 |a Advances in Intelligent Systems and Computing ;  |v v. 1219 
500 |a International conference proceedings. 
500 |a Includes author index. 
500 |a 2 Cybersecurity Awareness and Human Factors at Audit Committee Level 
505 0 |a Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References 
505 8 |a Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction 
505 8 |a 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background 
505 8 |a 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design 
505 8 |a 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction 
588 0 |a Print version record. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Human engineering  |v Congresses. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Ergonomie  |v Congrès. 
650 7 |a Psychology.  |2 bicssc 
650 7 |a Personnel & human resources management.  |2 bicssc 
650 7 |a User interface design & usability.  |2 bicssc 
650 7 |a Security & fire alarm systems.  |2 bicssc 
650 7 |a Psychology  |x General.  |2 bisacsh 
650 7 |a Business & Economics  |x Human Resources & Personnel Management.  |2 bisacsh 
650 7 |a Computers  |x User Interfaces.  |2 bisacsh 
650 7 |a Technology & Engineering  |x Engineering (General)  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Human engineering  |2 fast  |0 (OCoLC)fst00963014 
655 2 |a Congress 
655 7 |a Conference papers and proceedings  |2 fast  |0 (OCoLC)fst01423772 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Corradini, Isabella. 
700 1 |a Nardelli, Enrico. 
700 1 |a Ahram, Tareq Z. 
711 2 |a International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences  |n (11th :  |d 2020 :  |c Online) 
830 0 |a Advances in intelligent systems and computing ;  |v 1219. 
859 |a ELD  |b ebook 
884 |a LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl  |g 20200708  |k com.springer.onix.9783030525811  |q Uk 
889 |a (OCoLC)1164504120 
980 |a 019838014  |b 180  |c sid-180-col-bnbfidbbi 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fkatalog.fid-bbi.de%3Agenerator&rft.title=Advances+in+human+factors+in+cybersecurity%3A+AHFE+2020+Virtual+Conference+on+Human+Factors+in+Cybersecurity%2C+July+16-20%2C+2020%2C+USA&rft.date=2020&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Advances+in+human+factors+in+cybersecurity%3A+AHFE+2020+Virtual+Conference+on+Human+Factors+in+Cybersecurity%2C+July+16-20%2C+2020%2C+USA&rft.series=Advances+in+intelligent+systems+and+computing%2C+1219&rft.au=&rft.pub=Springer&rft.edition=&rft.isbn=3030525813
SOLR
_version_ 1778756570266468352
access_facet Electronic Resources
author2 Corradini, Isabella., Nardelli, Enrico., Ahram, Tareq Z.
author2_role , ,
author2_variant i c ic, e n en, t z a tz tza
author_corporate International Conference on Advances in Human Factors in Cybersecurity (2020 : Online), International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online)
author_corporate_role ,
author_facet Corradini, Isabella., Nardelli, Enrico., Ahram, Tareq Z., International Conference on Advances in Human Factors in Cybersecurity (2020 : Online), International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online)
author_sort International Conference on Advances in Human Factors in Cybersecurity Online)
building Library A
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection sid-180-col-bnbfidbbi
contents Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References, Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction, 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background, 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design, 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction
dewey-full 005.8
dewey-hundreds 000 - Computer science, information & general works
dewey-ones 005 - Computer programming, programs & data
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, knowledge & systems
facet_avail Online
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience
footnote International conference proceedings., Includes author index., 2 Cybersecurity Awareness and Human Factors at Audit Committee Level
format eBook
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Congress, Conference papers and proceedings fast (OCoLC)fst01423772, Conference papers and proceedings. lcgft, Actes de congrès. rvmgf
genre_facet Congresses., Congrès., Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès.
geogr_code not assigned
geogr_code_person not assigned
id 180-019838014
illustrated Not Illustrated
imprint Cham, Springer, 2020
imprint_str_mv Cham Springer 2020
institution FID-BBI-DE-23
is_hierarchy_id
is_hierarchy_title
isbn 9783030525811, 3030525813
isbn_isn_mv 9783030525804
isil_str_mv FID-BBI-DE-23
language English
last_indexed 2023-10-03T17:34:15.69Z
marc024a_ct_mv 10.1007/978-3-030-52
match_str corradini2020advancesinhumanfactorsincybersecurityahfe2020virtualconferenceonhumanfactorsincybersecurityjuly16202020usa
mega_collection British National Bibliography
physical 1 online resource (147 pages)
publishDate 2020
publishDateSort 2020
publishPlace Cham
publisher Springer
record_format marcfinc
record_id 019838014
recordtype marcfinc
rvk_facet No subject assigned
series Advances in intelligent systems and computing, 1219
series2 Advances in Intelligent Systems and Computing ; v. 1219
source_id 180
spelling International Conference on Advances in Human Factors in Cybersecurity (2020 : Online), Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors, Cham Springer 2020, 1 online resource (147 pages)., text rdacontent, computer rdamedia, online resource rdacarrier, Advances in Intelligent Systems and Computing ; v. 1219, International conference proceedings., Includes author index., 2 Cybersecurity Awareness and Human Factors at Audit Committee Level, Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References, Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction, 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background, 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design, 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction, Print version record., Computer security Congresses., Human engineering Congresses., Sécurité informatique Congrès., Ergonomie Congrès., Psychology. bicssc, Personnel & human resources management. bicssc, User interface design & usability. bicssc, Security & fire alarm systems. bicssc, Psychology General. bisacsh, Business & Economics Human Resources & Personnel Management. bisacsh, Computers User Interfaces. bisacsh, Technology & Engineering Engineering (General) bisacsh, Computer security fast (OCoLC)fst00872484, Human engineering fast (OCoLC)fst00963014, Congress, Conference papers and proceedings fast (OCoLC)fst01423772, Conference papers and proceedings. lcgft, Actes de congrès. rvmgf, Corradini, Isabella., Nardelli, Enrico., Ahram, Tareq Z., International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online), Advances in intelligent systems and computing ; 1219., ELD ebook, LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl 20200708 com.springer.onix.9783030525811 Uk, (OCoLC)1164504120
spellingShingle Advances in human factors in cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA, Advances in intelligent systems and computing, 1219, Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References, Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction, 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background, 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design, 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction, Computer security Congresses., Human engineering Congresses., Sécurité informatique Congrès., Ergonomie Congrès., Psychology., Personnel & human resources management., User interface design & usability., Security & fire alarm systems., Psychology General., Business & Economics Human Resources & Personnel Management., Computers User Interfaces., Technology & Engineering Engineering (General), Computer security, Human engineering, Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès.
title Advances in human factors in cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
title_auth Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
title_full Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors
title_fullStr Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors
title_full_unstemmed Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors
title_in_hierarchy 1219.. Advances in human factors in cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA (2020)
title_short Advances in human factors in cybersecurity
title_sort advances in human factors in cybersecurity ahfe 2020 virtual conference on human factors in cybersecurity july 16 20 2020 usa
title_sub AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
topic Computer security Congresses., Human engineering Congresses., Sécurité informatique Congrès., Ergonomie Congrès., Psychology., Personnel & human resources management., User interface design & usability., Security & fire alarm systems., Psychology General., Business & Economics Human Resources & Personnel Management., Computers User Interfaces., Technology & Engineering Engineering (General), Computer security, Human engineering, Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès.
topic_facet Computer security, Human engineering, Sécurité informatique, Ergonomie, Psychology., Personnel & human resources management., User interface design & usability., Security & fire alarm systems., Psychology, Business & Economics, Computers, Technology & Engineering, General., Human Resources & Personnel Management., User Interfaces., Engineering (General), Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès.