YiGong Zhang, Qian Yi, ShuPing Yi, XiaoLong Zhang, JiaJia Li
{"title":"Trustworthy interaction model: continuous authentication using time–frequency joint analysis of mouse biometrics","authors":"YiGong Zhang, Qian Yi, ShuPing Yi, XiaoLong Zhang, JiaJia Li","doi":"10.1080/0144929x.2024.2321933","DOIUrl":null,"url":null,"abstract":"The rapid development of information technology attracts more attention to information security. Static authentication (SA) technology is widely used in account protection. However, once this shiel...","PeriodicalId":55392,"journal":{"name":"Behaviour & Information Technology","volume":"12 1","pages":""},"PeriodicalIF":2.9000,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Behaviour & Information Technology","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1080/0144929x.2024.2321933","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid development of information technology attracts more attention to information security. Static authentication (SA) technology is widely used in account protection. However, once this shiel...
期刊介绍:
Behaviour & Information Technology (BIT) puts people before technology. As such it deviates from other related journals. It is the primary scientific venue for peer-reviewed publications on human-centred IT.
BIT reports original research studies, practical case studies, and thoughtful articles on:
• usability and user experience (UX)
• human computer interaction (HCI)
• human-centred and user-centred design
• the social, business and human aspects of the digital world.
The Journal attracts authors and readers from a variety of disciplines (e.g., usability, user experience, psychology, ergonomics, computer science, and sociology), originating from both academics and industry.
All papers are subject to initial appraisal by the Editor, and, if found suitable for further consideration, will undertake rigorous double blind peer review by independent, anonymous expert referees.