Latest News

**Call for Papers Volume 12, Issue 06, December 2023

 

SECURING HUMAN COMPUTER INTERACTION


Author : Triparna Mukherjee, Asoke Nath
[ Volume No.:V, Issue No.II-Mar 2016] [Page No : 602-607] [2016]

The weakest link to implementing security protocols in human computer interaction happens to be the human memory , and to aid the process of remembering security information often the most important security principles are often violated. This paper puts forward some of the guidelines that need to be followed while designing a secure human-computer interaction system. Password being the most common security tool has been studied with a survey relating to people’s reaction to more sophisticated and/or secure forms of it. Solutions have been provided by considering individual differences. Several factors which influence the security decisions of a user has been discussed as these form the loopholes in which most naïve users compromise security objectives.

Contact us

editor[at]ctts[dot]in




Warning: Trying to access array offset on value of type null in C:\xampp\htdocs\ctts\include\ad.php on line 8