LOW FLAT RATE $9.90 AUST-WIDE DELIVERY

Close Notification

Your cart does not contain any items

Socio-Technical Aspects in Security

12th International Workshop, STAST 2022, Copenhagen, Denmark, September 29, 2022, Revised Selected...

Maryam Mehrnezhad Simon Parkin

$107.95   $86.53

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer International Publishing AG
13 March 2025
This volume LNCS 13855 book constitutes the refereed proceedings of the 12th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2022, which held in Copenhagen, Denmark, during September 26, 2022.

The 6 regular papers and 2 short papers were carefully reviewed and selected from 20 submissions for inclusion in the book. The workshop focused especially on the interplay of technical and human factors in achieving or breaking computer security, privacy, and trust, in both organizational and individual settings.
Edited by:   ,
Imprint:   Springer International Publishing AG
Country of Publication:   Switzerland
Volume:   13855
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9783031830716
ISBN 10:   3031830717
Series:   Lecture Notes in Computer Science
Pages:   147
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
(Work in Progress)Considering Human Factors in Collaborative Decision Making for Secure Architecture Design.- Hunting High or Low Evaluating the Effectiveness of High Interaction and Low Interaction Honeypots.- Why Most Results of Socio Technical Security User Studies Are False And What to Do About it.- Verification of the Socio Technical Aspects of Voting The Case of the Polish Postal Vote.- I feel spied on and I don’t have any control over my data User Privacy Perception, Preferences and Trade offs in University Smart Buildings.- Situation Critical Intensive Cybersecurity Care Needed.- Design and Evaluation of an Anti Phishing Artifact Based on Useful Transparency.- (Work in Progress) Brick by Brick Using a Structured Building Blocks Method to Engage Participants and Collect IT Security Insights.

See Also