Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Interviews
biblio
Impact of Video Surveillance Systems on ATM PIN Security
Submitted by aekwall on Wed, 07/07/2021 - 4:56pm
shoulder surfing
Human behavior
Resiliency
Metrics
pubcrawl
video surveillance
video analysis
Threat Modeling
surveillance camera
Side-Channel vulnerabilities
side-channel attacks
security
Pins
PIN security
Online banking
Interviews
Inferring keyboard inputs
Guidelines
Computer vision-based attacks
ATM security
surveillance
Cameras
biblio
End User and Expert Perceptions of Threats and Potential Countermeasures
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
mental models
usable security and privacy
trust-based defensive methods
threats countermeasures
threat models
technical countermeasures
security technology
security expert perceptions
security
Scalability
pubcrawl
privacy technology
privacy
potential countermeasures
Biological system modeling
large-scale adoption
Interviews
internet
inductive research approach
Human Factors
Guidelines
expert systems
expert perceptions
end user perceptions
data privacy
conducted semistructured interviews
computer network security
cognitive science
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions
Submitted by grigby1 on Wed, 11/04/2020 - 1:43pm
security of data
learning needs
motivation
National Cyber League competition
novice players
player feedback
player interests
privacy
pubcrawl
Interviews
student engagement
systematic training
Systematics
Task Analysis
team game
tools
Training
undergraduate students
cybersecurity competition
advanced players
capture-the-flag type tasks
college-level cybersecurity competition
computer aided instruction
computer science education
computer security
confidence level
cyber physical systems
active learning
cybersecurity concepts
cybersecurity education
Educational institutions
Games
Human Factors
human-subject study
individual games
biblio
The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:42am
Australia
Human Behavior and Cybersecurity
time pressure
thematic analysis
semi-structured interviews
integrative framework
insecure HCS behavior
human cybersecurity behavior
cybersecurity incidents
cybersecurity experts
cybersecurity contexts
security of data
Human Factors
Stakeholders
computer security
Interviews
Bibliographies
Cybersecurity
pubcrawl
Human behavior
Task Analysis
biblio
Brain-Computer Interfaces in the Wild: Lessons Learned from a Large-Scale Deployment
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
BCI systems
honey pots
social configurations
public events
large-scale deployment
Honey pot (computing)
Headphones
group interactions
Computer interfaces
brain-computer interfaces
brain-computer interface system
behavioral patterns
Scalability
audience behavior
social sciences computing
behavioural sciences computing
Human Factors
sensors
pubcrawl
human computer interaction
Interviews
Resiliency
drones
biblio
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
End user Studies
Security by Default
User Perception
usable security and privacy
skilled attackers
signal protocol
secure messaging
pre-MME
pre-mass messenger encryption
post-MME
post-mass messenger encryption
Mental model
HCI
end-to-end encryption
Scalability
communication model
cognitive science
end-to-end security
whatsapp
authentication
Interviews
electronic messaging
pubcrawl
Resiliency
Protocols
data privacy
encryption
Cryptography
biblio
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review
Submitted by grigby1 on Wed, 03/18/2020 - 11:51am
Instruments
tools
Science of Security
Scalability
Resiliency
resilience
Reliability
pubcrawl
Policy-Governed Secure Collaboration
Metrics
Interviews
assessment validation.
Human behavior
education
cybersecurity education
Cybersecurity Concept Inventory (CCI)
Cybersecurity Assessment Tools (CATS) Project
computer security
composability
collaboration
Cats
biblio
Can Social Agents elicit Shame as Humans do?
Submitted by aekwall on Mon, 02/10/2020 - 12:09pm
job interviews
Training
social emotion shame
social agents elicit shame
Social Agents
social agent
shame
Scalability
pubcrawl
psychology
Atmospheric measurements
Job Interview Training
Interviews
Humanoid robots
Human Factors
Games
experiment
emotions
behavioural sciences computing
biblio
A Symptomatic Framework to Predict the Risk of Insider Threats
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
Insider Threat Scoring Engine (ITSE)
collaboration
Critical assets
critical infrastructure
critical infrastructure organisation
critical infrastructures
Engines
Human behavior
information security
information security threats
insider threat
insider threat events
insider threat framework for Namibia critical infrastructure organization
tools
Interviews
ITFNACIO
Metrics
policy-based governance
pubcrawl
resilience
Resiliency
risk management
security of data
symptomatic analysis
Symptomatic Analysis (SA)
symptomatic insider threat risk assessment framework
« first
‹ previous
1
2
3
4
next ›
last »