Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,354,998 papers from all fields of science
Search
Sign In
Create Free Account
Human–computer interaction (security)
Known as:
Human-computer interaction (security)
, HCI-Sec
, HCISec
Expand
HCISec is the study of interaction between humans and computers, or human–computer interaction, specifically as it pertains to information security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Broader (1)
Computer security
Human–computer interaction
Information security
Internet security
Security bug
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
User-Centric IT Security - How to Design Usable Security Mechanisms
H. Hof
arXiv.org
2015
Corpus ID: 18422246
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and…
Expand
Review
2014
Review
2014
QR Code Security: A Survey of Attacks and Challenges for Usable Security
Katharina Krombholz
,
P. Frühwirt
,
Peter Kieseberg
,
Ioannis Kapsalis
,
Markus Huber
,
E. Weippl
Interacción
2014
Corpus ID: 6272829
QR (Quick Response) codes are two-dimensional barcodes with the ability to encode different types of information. Because of…
Expand
Review
2011
Review
2011
Guidelines for usable cybersecurity: Past and present
Jason R. C. Nurse
,
S. Creese
,
M. Goldsmith
,
K. Lamberts
International Conference on Cryptography and…
2011
Corpus ID: 17633649
Usability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by…
Expand
2011
2011
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects
R. Biddle
,
Mohammad Mannan
,
P. V. Oorschot
,
Tara Whalen
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 15873305
Despite all efforts, password schemes intended to deploy or encourage the use of strong passwords have largely failed. As an…
Expand
Highly Cited
2010
Highly Cited
2010
Physiological value-based efficient usable security solutions for body sensor networks
K. Venkatasubramanian
,
S. Gupta
TOSN
2010
Corpus ID: 13269926
A Body Sensor Network (BSN) is a network of economically powered, wireless, wearable, and implanted health monitoring sensors…
Expand
2009
2009
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
I. Flechais
,
M. Sasse
Int. J. Hum. Comput. Stud.
2009
Corpus ID: 16505124
2009
2009
Authentication technologies for the blind or visually impaired
Nitesh Saxena
,
J. Watt
2009
Corpus ID: 10072767
Current research on "Usable Security" is still in its infancy and usable security solutions are often designed without paying…
Expand
Highly Cited
2008
Highly Cited
2008
A Brief Introduction to Usable Security
Bryan D. Payne
,
W. Keith Edwards
IEEE Internet Computing
2008
Corpus ID: 7234423
Researchers have studied usable computer security for more than 20 years, and developers have created numerous security…
Expand
Highly Cited
2007
Highly Cited
2007
Even Experts Deserve Usable Security: Design guidelines for security management systems
Sonia Chiasson
,
R. Biddle
,
Anil Somayaji
2007
Corpus ID: 6364968
to end-users, security is a primary task f or those charged with the security of system or network. Despite th e importance of…
Expand
Highly Cited
2004
Highly Cited
2004
In search of usable security: five lessons from the field
D. Balfanz
,
Glenn Durfee
,
Rebecca E. Grinter
,
D. Smetters
IEEE Security & Privacy Magazine
2004
Corpus ID: 1081684
A new system reduces the time to enroll in a secure wireless network by two orders of magnitude, and it also gets high marks for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE