Three Level Based Security for Improvised User Privacy in Human Computer Interaction
Ranjan Goyal1, Manjula R2, Gaurav K Sangle3, Thenmozhi T4, Shafiq Khan5
1Ranjan Goyal, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
2Manjula R*, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
3Gaurav K Sangle, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
4Thenmozhi T, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
5Shafiq Khan, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 4044-4048 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9313088619/2019©BEIESP | DOI: 10.35940/ijeat.F9313.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanism. Human Computer Interaction (HCI) is the sub field of Computer Science that studies how people interact with and through computational technologies. In this paper, a three-level model-based approach is provided for the end user privacy in the human computer interaction as the end user’s privacy in the area of HCI is emerging as critical design element for interacting systems in areas as diverse as e-commerce, health care, office work, personal communications etc. The data privacy of end user as well as the resource access privacy is needed to be considered. As of now, no proper solution exists for all types of interface users which is a major privacy issue. Hence, to provide the end users, their personal data protection as well as the resource access security, this paper focuses on analyzing and developing the theory of technological acceptance related to user privacy.
Keywords: Data security, Human computer interaction, three level security, User privacy, Quality of service.