Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Human–computer interaction (security)

Known as: Human-computer interaction (security), HCI-Sec, HCISec 
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Rather than recognizing software engineers' limitations, modern security practice has created an adversarial relationship between… Expand
  • figure 2
Is this relevant?
2015
2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have… Expand
  • figure 1
  • table I
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A Body Sensor Network (BSN) is a network of economically powered, wireless, wearable, and implanted health monitoring sensors… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Multi-factor authentication involves the use of more than one mode in authentication processes and is typically employed to… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Researchers have studied usable computer security for more than 20 years, and developers have created numerous security… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2007
2007
Given the increased focus on the need for usable security, it is now to be hoped that the issue will receive greater attention in… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A new system reduces the time to enroll in a secure wireless network by two orders of magnitude, and it also gets high marks for… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Recent results from usability studies of security systems have shown that end-users find them difficult to adopt and use. In this… Expand
Is this relevant?