فهرست مطالب :
Foreword
HCI International 2023 Thematic Areas and Affiliated Conferences
List of Conference Proceedings Volumes Appearing Before the Conference
Preface
5th International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT 2023)
HCI International 2024 Conference
Contents
Usable Security and Privacy
Transparency of Privacy Risks Using PIA Visualizations
1 Introduction
1.1 Objective and Research Questions
1.2 Outline
2 Background and Related Work
2.1 Privacy Impact Assessment
2.2 PETs and Transparency
2.3 Use Case Scenario and Visualizations for Users
2.4 PIA User Interfaces
3 Methodology
3.1 Study Design
3.2 Ethical Considerations
4 Results: Walkthroughs and Focus Groups
4.1 UI Design Aspects
4.2 Deviation from Users\' Expectations of a Typical Graph
4.3 Need for More Information and Clarifications
5 Discussions
5.1 UI Design Conventions and Clarifications
5.2 Mental Models Considerations
5.3 Need for More Information and Clarification Regarding the Terminology Used, the Context, and the Purpose
6 Conclusions
References
Overcoming Privacy-Related Challenges for Game Developers
1 Introduction
2 Related Work
2.1 Understanding and Implementing GDPR for Game Developers
3 Design Case
3.1 Stakeholder Workshops and Interviews
3.2 Flexible Design Structure
3.3 Careful Language Crafting
3.4 Gamification
3.5 User Testing
4 Discussion and Conclusion
4.1 Careful Crafting of the Language of the Questions
4.2 Flexible Design Structure
4.3 Playful Design
4.4 Discussion
References
Parents, Passwords, and Parenting: How Parents Think about Passwords and are Involved in Their Children’s Password Practices
1 Introduction
2 Related Research
2.1 Adults’ Password Habits
2.2 Youth Password Knowledge and Behavior
2.3 The Involvement of Parents in Youth Password Behavior
3 Methods
3.1 Survey Development
3.2 Participant Sampling and Demographics
3.3 Data Analysis
4 Results
4.1 Technology Savviness and Adoption
4.2 Parents’ Personal Devices, Accounts, and Passwords
4.3 Parents’ Password Behaviors
4.4 Parents’ Involvement with Children’s Password Creation
4.5 Parents’ Involvement with Children’s Password Tracking
4.6 Has Helping Children with Passwords Changed Parents’ Password Practices?
5 Discussion
5.1 RQ1: Parents’ Own Password Behaviors
5.2 RQ2: Parents’ Involvement in Children’s Password Behaviors
5.3 Practical Implications
6 Limitations
7 Conclusion
References
Refining the Understanding of Usable Security
1 Introduction
2 Defining Usability
3 Defining Usable Security
4 Usable Security Framework
5 From Usable Security to Security Culture
6 Conclusions
References
Survey of Services that Store Passwords in a Recoverable Manner
1 Introduction
2 Examples of Plaintext Password Leaks
2.1 Largest Breach Cases
2.2 Facebook Password Breach
2.3 Google\'s Plaintext Storage of Some G Suite Passwords
3 Related Works
3.1 Behavioral Tendencies of Developers
3.2 Password Reuse
4 Observation Survey of Password Storage Methods
4.1 Methodology
4.2 Website Survey of Alexa\'s Top Services
4.3 Google Play Top Ranking Apps Survey
4.4 Survey of Services Where Information on Inappropriate Password Storage Was Obtained Through Web or SNS Searches
4.5 Analyze the Common Elements Between Services that Store Passwords in Plaintext or Reversible Form
5 Future Works
6 Conclusion
References
(I Can\'t Get No) Satisfaction: On the Existence of Satisfaction as a Component of Usable Security and Privacy
1 Introduction
2 Components of Usability
3 Usability Evaluation Item Survey
4 Satisfaction Survey in Usable Security Research
4.1 Survey Method
4.2 Result
5 Discussion
6 Conclusion
References
Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH (Voter Data Information System) Application
1 Introduction
2 Literature Review
2.1 Information Quality
2.2 Data Security
3 Research Methods
4 Results and Discussion
4.1 Information Quality SIDALIH KPU
4.2 SIDALIH Data Security
5 Conclusion
References
Towards Improving the Efficacy of Windows Security Notifier for Apps from Unknown Publishers: The Role of Rhetoric
1 Introduction
2 Related Work
2.1 Lack of Comprehension
2.2 Past Experience
2.3 Optimism Bias
3 Design Principles
3.1 Reflection on Rationales
3.2 Contextualization
3.3 Persuasion Modes
4 Lab Study Methodology
4.1 Study Procedure
4.2 Analysis
5 Design Evolution
5.1 Inducing Focus
5.2 Design Identity
5.3 Overcoming Experience Bias
6 Online Study Methodology
6.1 Participant Recruitment
6.2 Procedure
6.3 Analysis
7 Online Study
7.1 User Ratings: Sensemaking in the Context of Warning Design
7.2 Control vs. Treatment Conditions
7.3 Comparison Between the Treatment Conditions
7.4 Scenario-Based Evaluation: Rhetoric Behind the Interventions
7.5 Impact of User Demographics on Warning Perceptions
8 Discussion
8.1 Moving Towards Reflective Design
8.2 Addressing Habituation
8.3 Limitations and Future Work
References
Data Privacy, Sovereignty and Governance
A Trustworthy Decentralized System for Health Data Integration and Sharing: Design and Experimental Validation
1 Introduction
2 Related Work
3 A Trustworthy Decentralized System for Health Data Integration and Sharing
3.1 System Requirements
3.2 System Architecture
4 Experiment and Application Scenarios
4.1 Experiment Overview
4.2 Application Scenarios
5 Conclusion
References
Usable Implementation of Data Sovereignty in Digital Ecosystems
1 Digital Ecosystems and Data Sovereignty
2 Target Groups
3 Goals and Challenges
3.1 Transparency
3.2 Self-determination
3.3 Limitations of Data Sovereignty in Digital Ecosystems
4 Methods and Tools
4.1 Organisational Implementation
4.2 Technical Enforcement
5 Summary and Conclusion
References
Research on the Capability Maturity Model of Data Security in the Era of Digital Transformation
1 Introduction
2 Literature Review
2.1 Related Studies on Digital Transformation
2.2 Related Studies on Capability Maturity Model
2.3 Related Studies on Data Security Capability Maturity Model
3 Research Methods
3.1 Systematic Literature Review
3.2 Expert Interview
4 The Proposed Capability Maturity Model of Data Security
4.1 Hierarchical Model of Enterprise Data Security
4.2 Capability Maturity Model of Data Security
5 Recommendation
5.1 Daily Maintenance is Required for Computer and Network Security
5.2 Physical Safety Protection to Avoid Safety Accidents Caused by Environmental Factors
5.3 Establish a Complete Monitoring and Automatic Response Mechanism
5.4 Enterprise Data Disaster Tolerance Measures can Systematically Ensure Security
6 Conclusions
References
Data Guardians\' Behaviors and Challenges While Caring for Others\' Personal Data
1 Introduction
2 Related Work
2.1 Experts
2.2 Non-expert General Public Users
3 Methodology
3.1 Sample and Recruitment
3.2 Data Collection
3.3 Data Analysis
4 Participants
5 Results
5.1 Privacy and Security Conceptualizations
5.2 What It Means to Care
5.3 How Participants Care
5.4 Motivations for Caring
5.5 Challenges to Caring
6 Discussion
6.1 Between Two Worlds
6.2 Domain Differences
6.3 Practical Implications for Supporting Data Guardians
6.4 Limitations and Future Work
7 Conclusion
References
A Privacy-Orientated Distributed Data Storage Model for Smart Homes
1 Introduction
2 Objective
3 Background
3.1 Internet of Things
3.2 User Concerns
3.3 Terms and Conditions
4 Why is Data Collected?
4.1 Making Money
4.2 Improving the Service
5 A Legal Approach
6 A Technical Approach
7 Conclusion
References
A Question Answering Tool for Website Privacy Policy Comprehension
1 Introduction
2 Relevant Works
2.1 Sentence Boundary Detection
2.2 Question to Document Matching
3 Technical Solution
3.1 Sentence Boundary Detection
3.2 Question to Document Matching
4 User Evaluation
4.1 Questionnaire Design
4.2 Data Analysis
5 Conclusions and Future Work
References
Perception of Privacy and Willingness to Share Personal Data in the Smart Factory
1 Introduction
1.1 Human Perspective is Key to Industry 4.0 Adoption
1.2 Information Privacy and Data Sensitivity in the Smart Factory
1.3 Empirical Approach and Logic of Procedure
2 Qualitative Focus Groups (Pre-study)
2.1 Sample
2.2 Procedure
2.3 Main Results
3 Quantitative Scenario-Based Survey (Main Study)
3.1 Methodological Approach
3.2 Sample Description and Statistical Analysis
4 Results
5 Discussion
References
Multi-ledger Coordinating Mechanism by Smart Contract for Individual-Initiated Trustworthy Data Sharing
1 Introduction
2 Related Work
3 Coordinating Multi-ledger by Smart Contracts
4 Experiment Result
5 Conclusion
References
Cybersecurity Challenges and Approaches for Critical Infrastructure and Emerging Technologies
Privacy Awareness Among Users of Digital Healthcare Services in Saudi Arabia
1 Introduction
2 Related Work
3 Methodology
3.1 Identifying Factors that Affect Users’ Privacy Awareness
3.2 Designing and Developing Questions
3.3 Pilot Study and Data Collection
4 Results and Discussion
4.1 Demographic Profile
4.2 Regulation
4.3 Privacy Policy
4.4 Potential Risk and Perceived Benefits
4.5 User Experience
4.6 Overall Self-assessed Awareness
4.7 Overall Objective Assessment
4.8 The Relationship Between Users’ Objective Privacy Awareness and Ages
4.9 The Relationship Between Users’ Objective Privacy Awareness and Gender
4.10 The Relationship Between Users’ Objective Privacy Awareness and Education
5 Conclusion and Future Work
References
Threat Actors and Methods of Attack to Social Robots in Public Spaces
1 Introduction
2 Malware
2.1 Types of Malwares
2.2 Methods of Installing Malware
3 Types of Attacks
3.1 Social Engineering
3.2 Denial-of-Service Attacks
3.3 Advanced Persistent Threats
3.4 Brute-Force Attacks
4 Concluding Remarks
References
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies
1 Introduction
2 Literature Review
2.1 Privacy Enhancing Technologies
2.2 Frameworks and Tools with a Privacy Component
2.3 Existing Tools for SMEs
3 Methodology
4 Results
4.1 Quantitative Data
4.2 Qualitative Data
5 Toward an SME Privacy Starter Pack
6 Conclusions
References
Cybersecurity Compliance Requirements for USA Department of Defense Contractors - Dragons at the Gate
1 Introduction
1.1 Attacks in 2022
1.2 Who Are the Dragons? The Top Five
1.3 Recent Infrastructure Attacks
2 Holding Off the Dragons
2.1 Leading up to Stopping the Dragons
2.2 Stopping the Dragons – More on the Interim Rule
2.3 Cyber Security Maturity Model Certification
3 The Struggle to Secure the Nation
3.1 Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
3.2 NIST Requirements
3.3 CMMC 2.0 Requirements
4 How Can the Contractor Comply?
5 Epilogue/Conclusion
References
Behavioral Biometrics Authentication in Critical Infrastructure Using Siamese Neural Networks
1 Introduction
2 Related Works
3 Methodology
3.1 Data Preparation
3.2 Siamese Neural Network Architecture
4 Experiments
5 Discussion and Conclusions
References
Trust and Blame in Self-driving Cars Following a Successful Cyber Attack
1 Introduction
2 Methodology
2.1 Participants
2.2 Design and Materials
2.3 Procedure
3 Results and Discussion
3.1 Trust
3.2 Blame
4 General Discussion
5 Conclusion
References
I Just Want to Help: SMEs Engaging with Cybersecurity Technology
1 Introduction
1.1 Background
2 Method
3 Results
3.1 Study 1
3.2 Study 2
3.3 Study 3
3.4 Study 4
4 Discussion
5 Limitations and Future Directions
6 Conclusion
References
Business Continuity Planning (BCP) for Election Systems
1 Introduction
2 Background
2.1 What is a System?
2.2 What is a Critical System?
2.3 Are Election Systems Critical?
3 How Can We Protect Critical Systems?
3.1 Disaster Recovery Planning
3.2 Evolution of Business Continuity Planning
3.3 When did BCP Become Important?
3.4 What’s Happening Now?
3.5 How Can We Achieve a Balance?
4 BCP and Election Systems
4.1 Applying the Balance to Election Systems
4.2 What are the Barriers to Success?
4.3 State-Level Barriers
4.4 What Progress Have We Made?
5 BCP for Similar Critical Systems
5.1 Private Industry Frameworks
5.2 Government-Mandated Frameworks
5.3 Compliance Audit and Verification
6 Conclusions
References
Cybersecurity as Part of Mission Assurance
1 Introduction
2 The Traditional Role of NASA/JPL Mission Assurance
2.1 Mission Assurance and Mission Success
2.2 Mission Assurance Domains
3 Response to Increased Cybersecurity Risk
3.1 Initial Technical Response at JPL
3.2 Initial Organizational Response at JPL
3.3 Steps Towards a CSA Role
3.4 Focusing on Cybersecurity Risk
4 Conclusions
4.1 Current state of the CSA Role
4.2 CSA Challenges
4.3 Looking to the Future of CSA
References
User-Centered Perspectives on Privacy and Security in Digital Environments
Investigating Mobile Instant Messaging Phishing: A Study into User Awareness and Preventive Measures
1 Introduction
2 Background
2.1 Smartphone Security Behaviour
2.2 Research Gap
3 Methodology
3.1 Survey Instrument
3.2 Recruitment
3.3 Participants
3.4 Data Analysis
4 Results
4.1 Phishing Awareness, Concerns, and Response
4.2 Phishing Preventive Behaviours
4.3 Phishing Self-efficacy
4.4 Relationship Between the Adoption of Phishing Preventive Behaviours and Phishing Self-efficacy, Phishing Knowledge, and Concern About Phishing
5 Discussion and Limitations
6 Conclusion
References
Look Before You Leap! Perceptions and Attitudes Towards Inferences in Wearable Fitness Trackers
1 Introduction
2 Related Work
2.1 Inferences in Fitness Trackers
2.2 Awareness of Inferences
2.3 Attitudes
3 Methods
3.1 Semi-Structured Interviews
3.2 Online Survey
4 Results
4.1 General Sharing and Concerns
4.2 Sharing Comfort with Recipients
4.3 Inference Perceptions and Attitudes
4.4 Emerging Factors
5 Study Limitations
6 Discussion
6.1 Reasons for Lack of Awareness
6.2 Comfort with Inferences
7 Conclusion
References
User Motivations of Secure Web Browsing
1 Introduction
2 Background
2.1 Secure Web Browsing (SWB)
2.2 SWB Motivations
2.3 SWB Mental Models
2.4 Research Gap
3 Methodology
3.1 Participants
3.2 Questionnaire
3.3 Pilot Testing
4 Results
4.1 RQ1: User Motivations for Using Secure Web Browsing
4.2 RQ2: User Perceptions and Mental Models of Secure Web Browsing
5 Discussion
5.1 Answering RQ1: Motivations of Using SWB
5.2 Answering RQ2: User Perceptions and Mental Models of SWB
5.3 Limitations and Future Work
6 Conclusion
References
Working for Home – Privacy and Confidentiality Issues in University Education
1 Introduction
2 Privacy and Confidentiality Issues in Higher Education
2.1 Privacy Issues
2.2 Ethical Issues and Big Data
3 Privacy and Confidentiality Issues During the Covid-19 Pandemic
4 Covid-19 Resources, Guidelines and Training
5 Protecting Research Activities Using Data Governance
6 Research Security, Key Regulations and Penalties
7 Trusted Cyberinfrastructure for University Research
8 Evolution of Cybersecurity for WFH and Remote Users
9 Conclusions
References
Overcoming the UX Challenges Faced by FIDO Credentials in the Consumer Space
1 Introduction
1.1 The Need for Cryptogaphic Authentication
1.2 FIDO2 and WebAuthn
2 First Challenge: The Private Key is Bound to the Authenticator
2.1 Challenges Faced by Passkeys
3 First Alternative User Experience (UX 1): Multi-device Authentication Without Passkey Syncing
3.1 Summary of Protocol 1
3.2 RP Database Schema
3.3 Registration Phase
3.4 Authentication on a Browser that Owns a FIDO Credential
3.5 Authentication on a Browser that Does Not Own a FIDO Credential
4 Second Challenge: Reliance on the Device Unlocking Mechanism
5 Second Alternative User Experience (UX 2): Cryptographically Protected Password as Second Factor
5.1 Joint Authentication with an Enhanced Credential and a Password
5.2 Replicating the Enhanced Credential Without Syncing
5.3 Required Extensions to WebAuthn
5.4 Summary of Protocol 2
5.5 RP Database Schema
5.6 Registration Phase
5.7 Authentication on a Browser that Owns a FIDO Credential
5.8 Authentication on a Browser that Does Not Own a FIDO Credential
6 Conclusion
References
Understanding Older Adults’ Safety Perceptions and Risk Mitigation Strategies when Accessing Online Services
1 Introduction
2 Related Work
2.1 Technology Adoption and Vulnerability
2.2 Risk Perception of Online Services
2.3 Learning and Adoption Barriers
3 Study Overview
3.1 Instruments
3.2 Method
4 Data Analysis
4.1 Questionnaire Results
4.2 Interviews
5 Findings
5.1 Perceived Differences Between Online and the Real World: Meaningful Engagement and Being in Control
5.2 Learning Requires the Right Motivation, Support, and Resources
5.3 Risk and Benefits Mitigation: The Balance Tilts Toward Risks (Avoidance)
5.4 Strategies to Avoid Risk: Resilient and Reluctant Seniors
5.5 Tech and Ageing
5.6 Findings and Discussion
5.7 RQ 2: How Do Older Adults Learn About Online Safety and How Were Their Learning Reflected in Their Everyday Online (Safety) Practices, Such as in Balancing the Risks and Benefits of Online Activities?
5.8 RQ 3: What Are the Consequences of Adopting and Engaging in Online Services Given Older Adults’ Safety Concerns, Perceptions, Practices, and Knowledge?
6 Recommendations: Online Service Design
6.1 Automate Digital Services While Retaining the “HUMan Touch”
6.2 Design Cybersafety Education into Service Tutorials
6.3 Appropriate and Personalized Learning Tools and Resources
6.4 Provide Customized Technology Solutions that Match Older Adults’ Expectations and Mental Models.
7 Conclusion
References
Smart Home Device Loss of Support: Consumer Perspectives and Preferences
1 Introduction
2 Methodology
2.1 Survey Development
2.2 Data Collection
2.3 Data Analysis
2.4 Limitations
3 Participants and Devices
4 Results
4.1 Update Importance
4.2 Security and Privacy Concern
4.3 Loss of Manufacturer Support
5 Discussion and Related Work
5.1 Proactive Communications
5.2 Aiding Consumers When Support Ends
References
Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users
1 Introduction
2 Related Work
3 Neurodiversity Specific Privacy, Safety, and Security Challenges in Extended Reality
3.1 Perceptual Manipulations
3.2 Immersive Attacks
4 XR Defensive Solutions
5 Discussion
5.1 Vulnerabilities
5.2 Perception and Cognition
6 Conclusion and Future Works
References
“Stay Out of My Way!”: The Impact of Cookie Consent Notice Design on Young Users’ Decision
1 Introduction
2 Methodology
3 Results and Analysis of Data
3.1 Testing Outcomes
3.2 Questionnaire Outcomes
4 Discussion
5 Conclusion
Appendix
References
Evaluating Individuals’ Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity Awareness
1 Introduction
2 Research Gap
3 Theoretical Framework and Research Hypotheses
3.1 Attitude
3.2 Subjective Norm
3.3 Perceived Behavioral Control
3.4 Cybersecurity Awareness
4 Research Methodology
5 Results
5.1 Participants
5.2 Measurement Model Assessment
5.3 Structural Model Assessment
5.4 Artificial Neural Network Results
5.5 Sensitivity Analysis
6 Discussion
7 Conclusion and Future Work
References
Human-Centric Cybersecurity: From Intrabody Signals to Incident Management
Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings
1 Introduction
2 Literature Review
3 Research Methodology
4 Survey Results and Findings
4.1 User Knowledge About Permission and Privacy
4.2 User Perception About Permission and Privacy
4.3 User Behaviour About Permission and Privacy
4.4 Summary Results
5 Discussion and Conclusions
References
Capability Maturity Models for Targeted Cyber Security Training
1 Introduction
2 Background: Methods Definition and Applications
2.1 Capability Maturity Models in Cyber Security and E-Learning
2.2 Cyber Security Curricular Framework
2.3 Bloom’s Taxonomy
3 Proposed Framework
4 Illustration of the Proposed Framework – Examples
5 Conclusions and Future Work Directions
References
Designing and Evaluating a Resident-Centric Digital Wallet Experience
1 Introduction
2 Background and Related Work
2.1 Centralized Identity, Federated Identity Management (FIM), and Self-sovereign Identity (SSI)
2.2 Government and Digital Identity
2.3 ARIES Identity Ecosystem
2.4 Existing Research on SSI Digital Wallet Usability
3 Research Objectives
3.1 Prototype
3.2 Method
3.3 Limitations
3.4 Participants
4 Results
4.1 Initial Impressions
4.2 Usability Testing
4.3 Security and Recovery
4.4 Scanning QR Codes
4.5 Connecting with Service Providers
5 Discussion
5.1 User-Centric Security
5.2 Accessibility and Inclusion
6 Conclusion
References
A Descriptive Enterprise System Model (DESM) Optimized for Cybersecurity Student and Practitioner Use
1 Introduction
1.1 Background and Motivation
1.2 Problem
2 Related Works
2.1 Model-Based System Engineering Tenets
3 Proposed Descriptive Enterprise System Model Framework
3.1 The Enterprise Function Axis
3.2 The Enterprise Attack Surface (EAS) Axis
3.3 The Enterprise Attack Surface Abstraction Axis
4 Creating a Descriptive Enterprise System Model
4.1 Defining the Enterprise Function Axis
4.2 Defining the Enterprise Attack Surface Structure Axis
4.3 Defining the Enterprise Attack Surface Abstraction Axis
5 Descriptive Enterprise System Model Application Domain
6 Relevance
7 Next Steps
References
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment
1 Introduction
2 Background
2.1 Current Security and Privacy Challenges in IoT
2.2 Current Solutions Proposed to Address the Security and Privacy Challenges in IoT
3 Our Proposed System
4 Methodology
4.1 Demographics
5 Discussion
6 Conclusions
References
Fail-Safe Automatic Timed Response Protocol for Cyber Incident and Fault Management
1 Introduction
1.1 Background
1.2 Hybrid System Operations (HSO)
1.3 Cyber Security
2 FATR
2.1 FATR Overview
2.2 Projected Benefits of FATR
2.3 FATR Protocol
3 Implementation
3.1 Prototype
3.2 Placement with Rancor
3.3 Procedures
3.4 Scenarios
4 Conclusions
References
Analysis of Country and Regional User Password Characteristics in Dictionary Attacks
1 Introduction
2 Related Works
3 Dataset and Password Guessing Method
4 Password-Guessing Results
4.1 Self-TLD-Guessing
4.2 Other-TLD-Guessing
4.3 Difference in Success Rate Between Self-TLD-Guessing and Other-TLD-Guessing
4.4 Characteristics of the TLD Dataset Used for the Dictionary
4.5 Tolerance to Password-Guessing Using Other TLD Datasets as Dictionaries
5 Discussion
5.1 Self-TLD-Guessing: Password Guessing by Own TLD Dictionary
5.2 Versatile and Less Versatile Dictionaries
5.3 Guess-Tolerant and Weak Guess-Tolerant TLDs
5.4 Appropriateness Between Dictionary-Listed Words and Change Rules
6 Conclusion
A List of TLDs Excluded from Evaluation in this Study
References
Cyber Technologies, Machine Learning, Additive Manufacturing, and Cloud in the Box to Enable Optimized Maintenance Processes in Extreme Conditions
1 Introduction
2 Purpose Statement
2.1 Research Goals
3 Research Hypotheses
4 Contribution to Knowledge
5 Review of Literature
5.1 The EOIT, BPR, and Process Optimization
5.2 Decision-Making with ML
5.3 AM
5.4 CIB
5.5 Review of Relevant Theories and Definitions
6 Research Methodology
6.1 Design of Experiment (DOE)
7 Analysis of the Research
8 Conclusion
References
Person Verification Based on Multipoint Measurement of Intrabody Propagation Signals
1 Introduction
2 Person Verification Using Intrabody Propagation Signals
2.1 Propagation Signal
2.2 Feature Extraction
2.3 Verification
3 Multipoint Verification in the Palm
3.1 Measurements and Verification at the Fingertip and Finger Base
3.2 Evaluation of Verification Performance
4 Multipoint Verification in the Body
4.1 Multipoint Verification Performance
5 Conclusions
References
Author Index