Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessibility, inclusive design, user experience. As new security risks are emerging with the continuous increase of Internet interconnections and the development of the Internet of Things, more recently security, trust and resilience have also become important for the development of interactive systems. Since users have been identified as one of the major security weaknesses in today’s technologies, HCI becomes a fundamental pillar for designing more secure (but still usable) systems. However, interactive system properties might overlap and sometimes create conflicts in user-centered development processes. For example, security could reduce system ...
While the domain of security dependent technologies brings new challenges to HCI research it seems t...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
Faced with an increasing range of attacks, the appropriate use of available security features in com...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (...
Part 10: WorkshopsInternational audienceWhilst usability has been the most prominent user interface ...
International audienceThis workshop focusses on the issues of bringing together several properties t...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
[[abstract]]The relationship between computers and human are closer due to the rapid technology deve...
This book contains revised selected papers presented at 3 workshops held at the 17th IFIP TC 13 Inte...
This book contains revised selected papers presented at 3 workshops held at the 17th IFIP TC 13 Inte...
\u3cp\u3eThis workshop focusses on the interplay of user experience (UX) and user-centered developme...
While the domain of security dependent technologies brings new challenges to HCI research it seems t...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
Faced with an increasing range of attacks, the appropriate use of available security features in com...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessi...
Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (...
Part 10: WorkshopsInternational audienceWhilst usability has been the most prominent user interface ...
International audienceThis workshop focusses on the issues of bringing together several properties t...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
[[abstract]]The relationship between computers and human are closer due to the rapid technology deve...
This book contains revised selected papers presented at 3 workshops held at the 17th IFIP TC 13 Inte...
This book contains revised selected papers presented at 3 workshops held at the 17th IFIP TC 13 Inte...
\u3cp\u3eThis workshop focusses on the interplay of user experience (UX) and user-centered developme...
While the domain of security dependent technologies brings new challenges to HCI research it seems t...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
Faced with an increasing range of attacks, the appropriate use of available security features in com...