Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,729,638 papers from all fields of science
Search
Sign In
Create Free Account
Human–computer interaction (security)
Known as:
Human-computer interaction (security)
, HCI-Sec
, HCISec
Expand
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Broader (1)
Computer security
Human–computer interaction
Information security
Internet security
Security bug
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Usable Security vs. Workflow Realities
J. Blythe
,
Vijay H. Kothari
,
Sean W. Smith
,
R. Koppel
2018
Corpus ID: 69897118
2017
2017
Longitudinal Privacy Management in Social Media: The Need for Better Controls
Mainack Mondal
,
Johnnatan Messias
,
Saptarshi Ghosh
,
K. Gummadi
,
Aniket Kate
IEEE Internet Computing
2017
Corpus ID: 9498839
This large-scale measurement study of Twitter focuses on understanding how users control the longitudinal exposure of their…
Expand
Review
2017
Review
2017
Usability in Solutions of Secure Email - A Tools Review
L. Ferreira
,
J. C. A. Silva
Interacción
2017
Corpus ID: 39712486
The adoption of Information and Communication Technologies in personal, social and corporative environments is increasingly…
Expand
2017
2017
Design process for usable security and authentication using a user-centered approach
Paulo Realpe-Muñoz
,
C. Collazos
,
T. Granollers
,
J. M. Arteaga
,
E. Fernández
Interacción
2017
Corpus ID: 14033639
Computer security is one of the most important current tasks in digital applications. However, from the best of our knowledge…
Expand
2015
2015
Usable Security using GOMS: A Study to Evaluate and Compare the Usability of User Accounts on E-Government Websites
A. Din
2015
Corpus ID: 60935382
iv List of Tables ix List of Figures xi
2014
2014
An Assessment Framework for Usable-Security Based on Decision Science
Yasser M. Hausawi
,
W. Allen
Interacción
2014
Corpus ID: 5447553
The balance between security and usability must be addressed as early as possible in the Software Development Life Cycle (SDLC…
Expand
2013
2013
Designing Usable , Yet Secure User Authentication Service : The Cognitive Dimension
Christine D. Braza
,
Pierre Porriera
,
Ahmed Seffahb
2013
Corpus ID: 16871587
User authentication is key in many interactive tourism software applications and Websites including online booking and…
Expand
2010
2010
Usable Security und Privacy
S. Fischer-Hübner
,
L. L. Iacono
,
Sebastian Möller
Datenschutz und Datensicherheit - DuD
2010
Corpus ID: 4775500
ZusammenfassungBedienbarkeit, Verständlichkeit und Akzeptanz von Schutzmechanismen stehen bei deren Entwicklung in der Regel…
Expand
2007
2007
Pastures: Towards Usable Security Policy Engineering
S. Bratus
,
A. Ferguson
,
D. McIlroy
,
Sean W. Smith
ARES
2007
Corpus ID: 15742899
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy…
Expand
2007
2007
User Studies on Security : Good vs . Perfect
Volker Roth
,
Thea Turner
2007
Corpus ID: 3259542
Increasingly, our daily activities are supported by networked computing. Coincident with this trend, criminals have been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE