Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Haber, Eben hand verification, biometrics authentication handheld devices, authentication mechanisms hard drives blocks on free list, sanitizing formatting monitoring, tools for overwriting data on repair utilities, file access security retirement rates sensitive data left on study of hard trust hardened passwords, keystroke biometrics hardware life cycle requirements, authentication accessibility tokens HCI (human-computer interaction) exoinformation interface design, ubiquitous computing privacy issues social theories reference books 2nd research on CSCW usability engineering user differences user types trust issues user experiences users, accommodating every type of HCI methods goal of product design/development identifying/defining security/privacy information for health advice, online, trusted design example HeavyCrypto high-fidelity prototypes of user interface high-fidelity prototypes of user interface high-latency networks honeypots Hong, Jason I. hotkeys, designating reserved, preventing impersonation HTTP logs, as security administration tool human factors authentication and 2nd bootstrapping and exploiting fallibility as weakest link in security chain 2nd 3rd overwriting data human-machine interfaces information-processing characteristics of users memory characteristics of methods of memorizing passwords selecting unreasonable demands on users production tasks versus supporting tasks security design hyperlinks, phishing attacks and |