skip to main content
10.1145/765891.766146acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

HCI and security systems

Published: 05 April 2003 Publication History

Abstract

This workshop will seek to understand the roles and demands placed on users of security systems, and explore design solutions that can assist in making security systems usable and effective. In addition to examining end-users, this workshop will also examine the issues faced by security system developers and operators. The goal of the workshop is to build a network of interested people, share research activities and results, discuss high priority areas for research and development, and explore opportunities for collaboration.

References

[1]
Adams, A., & Sasse, M.A. (1999). Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42, 41--46.
[2]
Anderson, R. (1994). Why cryptosystems fail. Communications of the ACM, 37, 32--40.
[3]
Brostoff, S., & Sasse, M.A. (2000). Are Passfaces more usable than passwords? A field trial investigation. In Proceedings of HCI 2000, Sept. 5--8, Sunderland, U.K., 405--424 Springer.
[4]
Crowder, R.G. (1976). Principles of learning and memory. Hillsdale, NJ: Lawrence Elrbaum Associates.
[5]
Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43, 91--98.
[6]
Joyce, R., & Gupta, G. (1990). Identity authentication based on keystroke latencies. Communications of the ACM, 33, 168--176.
[7]
Markowitz, J.A., (2000). Voice biometrics. Communications of the ACM, 43, 66--73.
[8]
Preece, J. (1994). Human-computer interaction. NY: Addison-Wesley.
[9]
Rejman-Greene, M. (2001). Biometrics-Real identities for a virtual world. BT Technology Journal, 19, 115--121.
[10]
Sasse, M.A., Brostoff, S., & Weirich, D. (2001). Transformng the 'weakest link': A human/computer interaction approach to usable and effective security. BT Technology Journal, 19, 122--131.
[11]
Schneier, B. (1999). Biometrics: Uses and abuses. Communications of the ACM, 42 (8), 58.
[12]
Yee, K.-P. (2002). User Interaction Design for Secure Systems. http://zesty.ca/sid/uidss-may-28.pdf.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '03: CHI '03 Extended Abstracts on Human Factors in Computing Systems
April 2003
471 pages
ISBN:1581136374
DOI:10.1145/765891
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 April 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. biometrics
  2. passwords

Qualifiers

  • Article

Conference

CHI03
Sponsor:
CHI03: Human Factors in Computing Systems
April 5 - 10, 2003
Florida, Ft. Lauderdale, USA

Acceptance Rates

Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI '25
CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)1
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media