Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Interviews
biblio
Design of Immersive Interactive Experience of Intangible Cultural Heritage based on Flow Theory
Submitted by grigby1 on Mon, 05/23/2022 - 3:58pm
immersive systems
Man-machine systems
Interaction design
Immersive experience
flow theory
experience design
cybernetics
cultural differences
psychology
Interviews
composability
privacy
Data models
Resiliency
Human Factors
Human behavior
pubcrawl
biblio
Exploring Provenance Needs in Software Reverse Engineering
Submitted by aekwall on Tue, 10/12/2021 - 3:20pm
Interviews
pubcrawl
Metrics
Resiliency
Human behavior
composability
reverse engineering
Provenance
Qualitative User Study
Visual Analytics-Provenance
biblio
Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective
Submitted by grigby1 on Thu, 09/16/2021 - 11:51am
Chief Information Officer (CIO)
Chief Information Security Officer (CISO)
Cyber-security
information security
Interviews
Leadership
Organizations
pubcrawl
qualitative inquiry
resilience
Resiliency
Stakeholders
Training
biblio
"Security should be there by default": Investigating how journalists perceive and respond to risks from the Internet of Things
Submitted by grigby1 on Tue, 07/27/2021 - 12:30pm
Media
smart devices
Security by Default
security
Scalability
Resiliency
resilience
pubcrawl
privacy
anticipatory threat models
Journalism
Interviews
Internet of Things
Industries
faces
Data protection
Computer crime
biblio
Impact of Video Surveillance Systems on ATM PIN Security
Submitted by aekwall on Wed, 07/07/2021 - 4:56pm
shoulder surfing
Human behavior
Resiliency
Metrics
pubcrawl
video surveillance
video analysis
Threat Modeling
surveillance camera
Side-Channel vulnerabilities
side-channel attacks
security
Pins
PIN security
Online banking
Interviews
Inferring keyboard inputs
Guidelines
Computer vision-based attacks
ATM security
surveillance
Cameras
biblio
End User and Expert Perceptions of Threats and Potential Countermeasures
Submitted by grigby1 on Mon, 03/29/2021 - 1:13pm
mental models
usable security and privacy
trust-based defensive methods
threats countermeasures
threat models
technical countermeasures
security technology
security expert perceptions
security
Scalability
pubcrawl
privacy technology
privacy
potential countermeasures
Biological system modeling
large-scale adoption
Interviews
internet
inductive research approach
Human Factors
Guidelines
expert systems
expert perceptions
end user perceptions
data privacy
conducted semistructured interviews
computer network security
cognitive science
biblio
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Submitted by grigby1 on Fri, 11/20/2020 - 2:26pm
post-breach security
zero risk appetite
Task Analysis
security theatre
Security Policies Analysis
security policies
security of data
security division
security culture
security controls
security breach
security behaviour
pubcrawl
Productivity
post-breach security changes
Companies
policy-based governance
Personnel
participatory action research
organization security division
organisational aspects
Investment
Interviews
humble inquiry
financial investment
financial data processing
employees
Data Breach
data analysis
biblio
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions
Submitted by grigby1 on Wed, 11/04/2020 - 1:43pm
security of data
learning needs
motivation
National Cyber League competition
novice players
player feedback
player interests
privacy
pubcrawl
Interviews
student engagement
systematic training
Systematics
Task Analysis
team game
tools
Training
undergraduate students
cybersecurity competition
advanced players
capture-the-flag type tasks
college-level cybersecurity competition
computer aided instruction
computer science education
computer security
confidence level
cyber physical systems
active learning
cybersecurity concepts
cybersecurity education
Educational institutions
Games
Human Factors
human-subject study
individual games
biblio
The Impact of Time Pressure on Human Cybersecurity Behavior: An Integrative Framework
Submitted by aekwall on Mon, 10/12/2020 - 11:42am
Australia
Human Behavior and Cybersecurity
time pressure
thematic analysis
semi-structured interviews
integrative framework
insecure HCS behavior
human cybersecurity behavior
cybersecurity incidents
cybersecurity experts
cybersecurity contexts
security of data
Human Factors
Stakeholders
computer security
Interviews
Bibliographies
Cybersecurity
pubcrawl
Human behavior
Task Analysis
biblio
Brain-Computer Interfaces in the Wild: Lessons Learned from a Large-Scale Deployment
Submitted by aekwall on Mon, 06/01/2020 - 10:42am
BCI systems
honey pots
social configurations
public events
large-scale deployment
Honey pot (computing)
Headphones
group interactions
Computer interfaces
brain-computer interfaces
brain-computer interface system
behavioral patterns
Scalability
audience behavior
social sciences computing
behavioural sciences computing
Human Factors
sensors
pubcrawl
human computer interaction
Interviews
Resiliency
drones
1
2
3
next ›
last »