Continuous user identification in distance learning: a recent technology perspective

D Portugal, JN Faria, M Belk, P Martins… - Smart Learning …, 2023 - Springer
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …

Ensuring academic integrity and trust in online learning environments: A longitudinal study of an ai-centered proctoring system in tertiary educational institutions

CA Fidas, M Belk, A Constantinides, D Portugal… - Education …, 2023 - mdpi.com
The credibility of online examinations in Higher Education is hardened by numerous factors
and use-case scenarios. This paper reports on a longitudinal study, that spanned over …

Privacy-preserving biometric-driven data for student identity management: Challenges and approaches

C Fidas, M Belk, D Portugal, A Pitsillides - Adjunct Proceedings of the …, 2021 - dl.acm.org
Biometric technologies are being considered lately for student identity management in
Higher Education Institutions, as they provide several advantages over the traditional …

Security and usability of a personalized user authentication paradigm: Insights from a longitudinal study with three healthcare organizations

A Constantinides, M Belk, C Fidas, R Beumers… - ACM Transactions on …, 2023 - dl.acm.org
This article proposes a user-adaptable and personalized authentication paradigm for
healthcare organizations, which anticipates to seamlessly reflect patients' episodic and …

Using Personal Data to Support Authentication: User Attitudes and Suitability

J Bonner, J O'Hagan, F Mathis, J Ferguson… - Proceedings of the 20th …, 2021 - dl.acm.org
Dynamic personal data based on a user's activity, such as recent visited physical locations,
browsing history, and call logs, update frequently, making it a promising token for user …

On the benefits and security risks of a user-centric data sharing platform for healthcare provision

M Banton, J Bowles, A Silvina, T Webber - Adjunct Proceedings of the …, 2021 - dl.acm.org
With data breaches on the rise especially after a Covid pandemic, a huge challenge is to
design secure platforms for sensitive data sharing and to support vital decisions for both …

Eye gaze and interaction differences of holistic versus analytic users in image-recognition human interaction proof schemes

P Leonidou, A Constantinides, M Belk, C Fidas… - … Conference on Human …, 2021 - Springer
Abstract Image-recognition Human Interaction Proof (HIP) schemes are widely used security
defense mechanisms that are utilized by service providers to determine whether a human …

Conflict-free access rules for sharing smart patient health records

M Banton, J Bowles, A Silvina, T Webber - International Joint Conference …, 2021 - Springer
With an increasing trend in personalised healthcare provision across Europe, we need
solutions to enable the secure transnational sharing of medical records, establishing …

Beautiful secrets: using aesthetic images to authenticate users

N Tractinsky, D Klimov - arXiv preprint arXiv:2204.05623, 2022 - arxiv.org
We propose and evaluate an authentication scheme that improves usability and user
experience issues in the authentication process due to its reliance on people's aesthetic …

An Empirical Study of Picture Password Composition on Smartwatches

M Belk, C Fidas, E Katsi, A Constantinides… - … –INTERACT 2021: 18th …, 2021 - Springer
Recent research works suggest that human cognitive differences affect security and usability
of picture passwords within a variety of interaction contexts, such as conventional desktops …