无力向前 发表于 2025-3-21 17:53:02

书目名称HCI for Cybersecurity, Privacy and Trust影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0420133<br><br>        <br><br>书目名称HCI for Cybersecurity, Privacy and Trust读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0420133<br><br>        <br><br>

内疚 发表于 2025-3-21 22:44:36

http://reply.papertrans.cn/43/4202/420133/420133_2.png

询问 发表于 2025-3-22 01:14:11

Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?d Reality game, CybAR, which was designed to educate users about cybersecurity in an effective and entertaining way. This research incorporates decision-making style into Technology Threat Avoidance Theory (TTAT) of CybAR game use. This paper particularly focuses on the role of decision-making style

慢跑鞋 发表于 2025-3-22 07:41:25

http://reply.papertrans.cn/43/4202/420133/420133_4.png

Repatriate 发表于 2025-3-22 11:40:31

Building Connections for a Secure User Experience an important topic. There is also a general lack of easily comprehensible information and awareness when it comes to new regulations like the General Data Protection Regulation (GDPR) [.]. Changes in processes or requirements that involve the use of certain data are avoided without studying the fin

粗俗人 发表于 2025-3-22 16:58:41

http://reply.papertrans.cn/43/4202/420133/420133_6.png

忍耐 发表于 2025-3-22 18:21:29

Analyzing Cybersecurity Understanding Using a Brain Computer Interface, in high school and with a curriculum that engages the student’s interest in a highly technical topic. The research project presented here explores the best way to teach cybersecurity to high school students to accomplish these goals. Researchers developed and delivered cybersecurity lectures to th

FUSE 发表于 2025-3-22 23:54:44

Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminals. Technology design is important for cybersecurity, but it is also necessary to understand the inse

挡泥板 发表于 2025-3-23 04:12:44

http://reply.papertrans.cn/43/4202/420133/420133_9.png

IVORY 发表于 2025-3-23 07:11:50

http://reply.papertrans.cn/43/4202/420133/420133_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: HCI for Cybersecurity, Privacy and Trust; Second International Abbas Moallem Conference proceedings 2020 Springer Nature Switzerland AG 202