|
|
|
|
LEADER |
05984aam a22007451a 4500 |
001 |
180-019838014 |
003 |
Uk |
005 |
20230220170527.0 |
006 |
m || d | |
007 |
cr ||||||||||| |
008 |
200711s2020 sz o 101 0 eng d |
015 |
|
|
|a GBC337854
|2 bnb
|
020 |
|
|
|a 9783030525811
|q (electronic bk.)
|
020 |
|
|
|a 3030525813
|q (electronic bk.)
|
020 |
|
|
|z 9783030525804
|
024 |
8 |
|
|a 10.1007/978-3-030-52
|
037 |
|
|
|a com.springer.onix.9783030525811
|b Springer Nature
|
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d GW5XE
|d LQU
|d EBLCP
|d OCLCF
|d NLW
|d UKAHL
|d N$T
|d OCLCO
|d COM
|d OCLCQ
|d OCLCO
|d OCLCQ
|d Uk
|e pn
|
042 |
|
|
|a ukblsr
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
111 |
2 |
|
|a International Conference on Advances in Human Factors in Cybersecurity
|d (2020 :
|c Online)
|
245 |
1 |
0 |
|a Advances in human factors in cybersecurity
|b AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA
|c Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors
|
260 |
|
|
|a Cham
|b Springer
|c 2020
|
300 |
|
|
|a 1 online resource (147 pages).
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
1 |
|
|a Advances in Intelligent Systems and Computing ;
|v v. 1219
|
500 |
|
|
|a International conference proceedings.
|
500 |
|
|
|a Includes author index.
|
500 |
|
|
|a 2 Cybersecurity Awareness and Human Factors at Audit Committee Level
|
505 |
0 |
|
|a Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References
|
505 |
8 |
|
|a Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction
|
505 |
8 |
|
|a 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background
|
505 |
8 |
|
|a 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design
|
505 |
8 |
|
|a 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
0 |
|a Human engineering
|v Congresses.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
6 |
|a Ergonomie
|v Congrès.
|
650 |
|
7 |
|a Psychology.
|2 bicssc
|
650 |
|
7 |
|a Personnel & human resources management.
|2 bicssc
|
650 |
|
7 |
|a User interface design & usability.
|2 bicssc
|
650 |
|
7 |
|a Security & fire alarm systems.
|2 bicssc
|
650 |
|
7 |
|a Psychology
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business & Economics
|x Human Resources & Personnel Management.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x User Interfaces.
|2 bisacsh
|
650 |
|
7 |
|a Technology & Engineering
|x Engineering (General)
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Human engineering
|2 fast
|0 (OCoLC)fst00963014
|
655 |
|
2 |
|a Congress
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|0 (OCoLC)fst01423772
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 lcgft
|
655 |
|
7 |
|a Actes de congrès.
|2 rvmgf
|
700 |
1 |
|
|a Corradini, Isabella.
|
700 |
1 |
|
|a Nardelli, Enrico.
|
700 |
1 |
|
|a Ahram, Tareq Z.
|
711 |
2 |
|
|a International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences
|n (11th :
|d 2020 :
|c Online)
|
830 |
|
0 |
|a Advances in intelligent systems and computing ;
|v 1219.
|
859 |
|
|
|a ELD
|b ebook
|
884 |
|
|
|a LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl
|g 20200708
|k com.springer.onix.9783030525811
|q Uk
|
889 |
|
|
|a (OCoLC)1164504120
|
980 |
|
|
|a 019838014
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756570266468352 |
access_facet |
Electronic Resources |
author2 |
Corradini, Isabella., Nardelli, Enrico., Ahram, Tareq Z. |
author2_role |
, , |
author2_variant |
i c ic, e n en, t z a tz tza |
author_corporate |
International Conference on Advances in Human Factors in Cybersecurity (2020 : Online), International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online) |
author_corporate_role |
, |
author_facet |
Corradini, Isabella., Nardelli, Enrico., Ahram, Tareq Z., International Conference on Advances in Human Factors in Cybersecurity (2020 : Online), International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online) |
author_sort |
International Conference on Advances in Human Factors in Cybersecurity Online) |
building |
Library A |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
sid-180-col-bnbfidbbi |
contents |
Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References, Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction, 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background, 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design, 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Online |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
International conference proceedings., Includes author index., 2 Cybersecurity Awareness and Human Factors at Audit Committee Level |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Congress, Conference papers and proceedings fast (OCoLC)fst01423772, Conference papers and proceedings. lcgft, Actes de congrès. rvmgf |
genre_facet |
Congresses., Congrès., Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès. |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-019838014 |
illustrated |
Not Illustrated |
imprint |
Cham, Springer, 2020 |
imprint_str_mv |
Cham Springer 2020 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9783030525811, 3030525813 |
isbn_isn_mv |
9783030525804 |
isil_str_mv |
FID-BBI-DE-23 |
language |
English |
last_indexed |
2023-10-03T17:34:15.69Z |
marc024a_ct_mv |
10.1007/978-3-030-52 |
match_str |
corradini2020advancesinhumanfactorsincybersecurityahfe2020virtualconferenceonhumanfactorsincybersecurityjuly16202020usa |
mega_collection |
British National Bibliography |
physical |
1 online resource (147 pages) |
publishDate |
2020 |
publishDateSort |
2020 |
publishPlace |
Cham |
publisher |
Springer |
record_format |
marcfinc |
record_id |
019838014 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
series |
Advances in intelligent systems and computing, 1219 |
series2 |
Advances in Intelligent Systems and Computing ; v. 1219 |
source_id |
180 |
spelling |
International Conference on Advances in Human Factors in Cybersecurity (2020 : Online), Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors, Cham Springer 2020, 1 online resource (147 pages)., text rdacontent, computer rdamedia, online resource rdacarrier, Advances in Intelligent Systems and Computing ; v. 1219, International conference proceedings., Includes author index., 2 Cybersecurity Awareness and Human Factors at Audit Committee Level, Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References, Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction, 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background, 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design, 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction, Print version record., Computer security Congresses., Human engineering Congresses., Sécurité informatique Congrès., Ergonomie Congrès., Psychology. bicssc, Personnel & human resources management. bicssc, User interface design & usability. bicssc, Security & fire alarm systems. bicssc, Psychology General. bisacsh, Business & Economics Human Resources & Personnel Management. bisacsh, Computers User Interfaces. bisacsh, Technology & Engineering Engineering (General) bisacsh, Computer security fast (OCoLC)fst00872484, Human engineering fast (OCoLC)fst00963014, Congress, Conference papers and proceedings fast (OCoLC)fst01423772, Conference papers and proceedings. lcgft, Actes de congrès. rvmgf, Corradini, Isabella., Nardelli, Enrico., Ahram, Tareq Z., International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences (11th : 2020 : Online), Advances in intelligent systems and computing ; 1219., ELD ebook, LDL ebooks ONIX to marcxml transformation using Record_Load-eBooks_Legal_Deposit_onix2marc_v2-1.xsl 20200708 com.springer.onix.9783030525811 Uk, (OCoLC)1164504120 |
spellingShingle |
Advances in human factors in cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA, Advances in intelligent systems and computing, 1219, Intro -- Advances in Human Factors and Ergonomics 2020 -- Preface -- Contents -- Cognitive Factors, Personality and Decisions Making -- Creative Manual Code Obfuscation as a Countermeasure Against Software Reverse Engineering -- 1 Introduction -- 2 Past Research -- 3 Method and Materials -- 4 Results and Discussion -- References -- Cyberbullying Perceptions and Experiences in Diverse Youth -- 1 Introduction -- 2 Background and Related Work -- 3 Self-disclosure and Cyberbullying Behavior -- 4 Focus Group with LGBTQ+ Youths -- 5 Conclusions and Future Work -- References, Ethics, Economics, and Ransomware: How Human Decisions Grow the Threat -- 1 Introduction -- 2 Evolution of Ransomware -- 3 Methodology -- 4 Results -- 4.1 Impacts of Ransomware Infection -- 5 Outlawing Ransom Payments -- 6 Conclusion -- References -- Does the Propensity to Take Risks Influence Human Interactions with Autonomous Systems? -- 1 Introduction -- 2 Research Background -- 3 Previous Findings -- 4 Method -- 5 Results -- 6 Discussion -- 7 Final Considerations -- References -- The Impact of Fake News on the African-American Community -- 1 Introduction, 2 The Impact of Fake News on African-American Voters -- 3 Research Design -- 4 Analysis of Results of F-R-S Choice -- 5 Analysis of Study of "Impressions" -- 6 Conclusions -- References -- Cybersecurity Tools and Analytics -- Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics -- 1 Introduction -- 2 Dataset -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Learning Algorithms -- 3.3 Models Evaluation -- 4 Results and Discussion -- References -- An Analysis of Phishing Emails and How the Human Vulnerabilities are Exploited -- 1 Introduction -- 2 Background, 3 Methodology -- 3.1 Data Collection -- 3.2 Coding Strategy -- 4 Results -- 5 Discussion -- References -- Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 3 Model for Classification of Academic Information -- 3.1 Preprocessing -- 3.2 Model Development with GANN-C -- 4 Results -- 5 Conclusions and Future Works -- References -- Use Mouse Ballistic Movement for User Authentication Based on Hilbert-Huang Transform -- 1 Introduction -- 2 Method -- 2.1 Experimental Design, 2.2 Data Processing -- 3 Results -- 4 Discussion and Conclusion -- References -- Awareness, Training and Education -- Understanding and Enabling Tactical Situational Awareness in a Security Operations Center -- 1 Introduction -- 2 Defining Tactical Situational Awareness in Cybersecurity -- 2.1 Methods -- 2.2 Results -- 3 Evaluating a Prototype Situational Awareness Capability -- 3.1 Concept and Design -- 3.2 Methods -- 3.3 Results -- 4 Discussion -- References -- Cybersecurity Risks and Situation Awareness: Audit Committees' Appraisal -- 1 Introduction, Computer security Congresses., Human engineering Congresses., Sécurité informatique Congrès., Ergonomie Congrès., Psychology., Personnel & human resources management., User interface design & usability., Security & fire alarm systems., Psychology General., Business & Economics Human Resources & Personnel Management., Computers User Interfaces., Technology & Engineering Engineering (General), Computer security, Human engineering, Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès. |
title |
Advances in human factors in cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA |
title_auth |
Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA |
title_full |
Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors |
title_fullStr |
Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors |
title_full_unstemmed |
Advances in human factors in cybersecurity AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA Isabella Corradini, Enrico Nardelli, Tareq Ahram, editors |
title_in_hierarchy |
1219.. Advances in human factors in cybersecurity: AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA (2020) |
title_short |
Advances in human factors in cybersecurity |
title_sort |
advances in human factors in cybersecurity ahfe 2020 virtual conference on human factors in cybersecurity july 16 20 2020 usa |
title_sub |
AHFE 2020 Virtual Conference on Human Factors in Cybersecurity, July 16-20, 2020, USA |
topic |
Computer security Congresses., Human engineering Congresses., Sécurité informatique Congrès., Ergonomie Congrès., Psychology., Personnel & human resources management., User interface design & usability., Security & fire alarm systems., Psychology General., Business & Economics Human Resources & Personnel Management., Computers User Interfaces., Technology & Engineering Engineering (General), Computer security, Human engineering, Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès. |
topic_facet |
Computer security, Human engineering, Sécurité informatique, Ergonomie, Psychology., Personnel & human resources management., User interface design & usability., Security & fire alarm systems., Psychology, Business & Economics, Computers, Technology & Engineering, General., Human Resources & Personnel Management., User Interfaces., Engineering (General), Congress, Conference papers and proceedings, Conference papers and proceedings., Actes de congrès. |