Editorial: Human-Centric Security and Privacy

被引:1
|
作者
Nepal, Surya [1 ,2 ]
Ko, Ryan K. L. [3 ]
Grobler, Marthie [1 ]
Camp, L. Jean [4 ]
机构
[1] CSIROs Data61, Eveleigh, NSW, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA, Australia
[3] Univ Queensland, Sch Informat Technol & Elect Engn, Brisbane, Qld, Australia
[4] Indiana Univ, Sch Informat Comp & Engn, Bloomington, IN USA
来源
FRONTIERS IN BIG DATA | 2022年 / 5卷
关键词
cyber security; human-centric security; usable security; usable privacy; HCI and cyber security;
D O I
10.3389/fdata.2022.848058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页数:2
相关论文
共 50 条
  • [1] A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones
    Farzand, Habiba
    Abraham, Melvin
    Brewster, Stephen
    Khamis, Mohamed
    Marky, Karola
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2024,
  • [2] Editorial: Exploring human-centric lighting
    Boyce, Peter
    [J]. LIGHTING RESEARCH & TECHNOLOGY, 2016, 48 (02) : 101 - 101
  • [3] VAIM: Verifiable Anonymous Identity Management for Human-Centric Security and Privacy in the Internet of Things
    Ra, Gyeongjin
    Kim, Taehoon
    Lee, Imyeong
    [J]. IEEE ACCESS, 2021, 9 : 75945 - 75960
  • [4] Cyber-Security: A Human-Centric Approach
    Liaropoulos, Andrew
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 189 - 194
  • [5] Privacy protection in human-centric healthcare home environment
    Seo, Deok-Seok
    Kim, Soon Seok
    Lee, Yong Hee
    Kim, Gwang Hee
    Shin, Yoon Seok
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1536 - 1542
  • [6] Research directions for trust and security in human-centric computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 83 - 91
  • [7] Local privacy protection classification based on human-centric computing
    Yin, Chunyong
    Zhou, Biao
    Yin, Zhichao
    Wang, Jin
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [8] Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities
    Rishiwal, Vinay
    Agarwal, Udit
    Alotaibi, Aziz
    Tanwar, Sudeep
    Yadav, Preeti
    Yadav, Mano
    [J]. IEEE Access, 2024, 12 : 138763 - 138788
  • [9] Security and access control for a human-centric collaborative commerce system
    Kim, Seung-yun
    Zhu, Jian
    Smari, Waleed W.
    McQuay, William K.
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2006, : 429 - +
  • [10] A human-centric cyber security training tool for prioritizing MSNAs
    Depassier, Vincent
    Torres, Romina
    [J]. 2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS, ASEW, 2023, : 54 - 61