Leveraging web and behavioural data for usable adaptive cybersecurity
There has been a general consensus in the computer security research community that the usability of cybersecurity is critical to maintaining and improving the security of information systems. However, the human element of cybersecurity is still not well understood hence the problem of designing sec...
| Main Author: | Addae, Joyce Hoese |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/56813/ |
Similar Items
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010)
by: Delfos, Jacob, et al.
Published: (2010)
Analyzing factors influencing customer satisfaction on purchased cybersecurity solutions within B2B organizations in Malaysia
by: Subramaniam, Nageswar Rao
Published: (2024)
by: Subramaniam, Nageswar Rao
Published: (2024)
Inhabiting adaptive architecture
by: Schnädelbach, Holger
Published: (2016)
by: Schnädelbach, Holger
Published: (2016)
Enhancing accessibility to web mapping systems with technology-aligned adaptive profiles
by: Delfos, Jacob, et al.
Published: (2013)
by: Delfos, Jacob, et al.
Published: (2013)
Adaptive behavioural cognition.
by: Briscoe, Garry
Published: (1997)
by: Briscoe, Garry
Published: (1997)
Enaction in adaptive architecture
by: Jäger, Nils
Published: (2016)
by: Jäger, Nils
Published: (2016)
Reciprocal control in adaptive environments
by: Jäger, Nils, et al.
Published: (2017)
by: Jäger, Nils, et al.
Published: (2017)
How can people’s spatial behaviour be used to dynamically lay out content on multi-user, interactive screens, and how does this dynamic layout affect people’s spatial behaviour?
by: Burnett, James R
Published: (2023)
by: Burnett, James R
Published: (2023)
Attitude determination from GNSS using adaptive Kalman filtering
by: El-Mowafy, Ahmed, et al.
Published: (2005)
by: El-Mowafy, Ahmed, et al.
Published: (2005)
Bridging the automated machine learning transparency and usability gap for non-experts: a user-centered design and evaluation study
by: Sahidon, Muhammad Alif Danial
Published: (2025)
by: Sahidon, Muhammad Alif Danial
Published: (2025)
Behavioural adaptation to in-vehicle navigation systems
by: Forbes, Nicholas Lloyd
Published: (2009)
by: Forbes, Nicholas Lloyd
Published: (2009)
Health behaviours and attitudes towards being role models
by: Blake, Holly, et al.
Published: (2013)
by: Blake, Holly, et al.
Published: (2013)
“C'Mon dude!”: Users adapt their behaviour to a robotic agent with an attention model
by: Cavedon, L., et al.
Published: (2015)
by: Cavedon, L., et al.
Published: (2015)
"She's a dog at the end of the day": guide dog owners' perspectives on the behaviour of their guide dog
by: Craigon, Peter J., et al.
Published: (2017)
by: Craigon, Peter J., et al.
Published: (2017)
A user adaptable user interface model to support ubiquitous user access to EIS style applications
by: Davis, Jon, et al.
Published: (2005)
by: Davis, Jon, et al.
Published: (2005)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Human Health and Climate Change: Leverage Points for Adaptation in Urban Environments
by: Proust, Katrina, et al.
Published: (2012)
by: Proust, Katrina, et al.
Published: (2012)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Augmenting automated analytics using fluorescent nanosensors
by: Chauhan, Veeren M
Published: (2018)
by: Chauhan, Veeren M
Published: (2018)
User identification approach based on simple gestures
by: Guna, J., et al.
Published: (2014)
by: Guna, J., et al.
Published: (2014)
Improving customer billing telephony using User Experience (UX) approach
by: Bidin, Raziera
Published: (2018)
by: Bidin, Raziera
Published: (2018)
Single hand Indian classical gesture recognition based on discrete wavelet transform and discrete cosine transform feature extraction
by: Jaganathan, Kavitha
Published: (2015)
by: Jaganathan, Kavitha
Published: (2015)
Towards an extended festival viewing experience
by: Velt, Raphael, et al.
Published: (2015)
by: Velt, Raphael, et al.
Published: (2015)
Little flock - designing and evaluating a mobile application for Christians in house groups
by: Wang, Zhenyi
Published: (2014)
by: Wang, Zhenyi
Published: (2014)
Do androids dream of electric steeds? The allure of horse-computer interaction
by: North, Steve
Published: (2016)
by: North, Steve
Published: (2016)
Analytical and experimental investigation of incremental sheet forming of thermoplastics
by: Zhu, Hui
Published: (2023)
by: Zhu, Hui
Published: (2023)
Applying Usability and HCI Principles in Developing Marketing Websites
by: Issa, Tomayess, et al.
Published: (2012)
by: Issa, Tomayess, et al.
Published: (2012)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Avoiding the internet of insecure industrial things
by: Urquhart, Lachlan, et al.
Published: (2018)
by: Urquhart, Lachlan, et al.
Published: (2018)
Human behaviour in emergency situations: comparisons between aviation and rail domains
by: Stedmon, Alex, et al.
Published: (2015)
by: Stedmon, Alex, et al.
Published: (2015)
Usability and human computer interaction in developing websites: an Australian perspective
by: Issa, Tomayess, et al.
Published: (2010)
by: Issa, Tomayess, et al.
Published: (2010)
The Cognitive and Neural Mechanisms Underlying Learning from Errors
by: Khoo, Joshua Kah Meng
Published: (2023)
by: Khoo, Joshua Kah Meng
Published: (2023)
Investigating automation reliance: three experiments
by: Suraci, Lara
Published: (2024)
by: Suraci, Lara
Published: (2024)
Analysis the performance of adaptive demodulator in terms of bit error rate for software defined radio
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2009)
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2009)
Web Spambot Detection Based on Web Navigation Behaviour
by: Hayati, Pedram, et al.
Published: (2010)
by: Hayati, Pedram, et al.
Published: (2010)
Optimised task allocation using dynamic production data in human-robot teams
by: Smith, Thomas Anthony
Published: (2021)
by: Smith, Thomas Anthony
Published: (2021)
Trust-based spectrum sharing for cognitive radio networks
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Similar Items
-
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017) -
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025) -
Design of a web-based LBS framework addressing usability, cost, and implementation constraints
by: Delfos, Jacob, et al.
Published: (2010) -
Analyzing factors influencing customer satisfaction on purchased cybersecurity solutions within B2B organizations in Malaysia
by: Subramaniam, Nageswar Rao
Published: (2024) -
Inhabiting adaptive architecture
by: Schnädelbach, Holger
Published: (2016)