ArtInHCI2024 Session: Information Security in Human-Computer Interaction (ArtInHCI’24-ISHCI) is conducted under the 2nd International Conference on Artificial Intelligence and Human-Computer Interaction, held during October 25-27, 2024 in Kunming. During human-computer interaction, vast amounts of user data are collected, stored, and processed, encompassing sensitive information like personal details, transaction histories, and communication contents. The leakage or misuse of such information poses significant risks to users, including economic losses, reputational damage, and even identity theft. Therefore, ensuring information security in human-computer interaction is paramount to safeguarding user data from unauthorized access.
The characteristics of information security in this context are as follows:
(1) Real-Time Response: Given the real-time nature of data generated during human-computer interaction, information security measures must be agile, capable of promptly detecting and mitigating potential security threats. The system must continuously monitor data flows to promptly address any instances of data breaches or attacks.
(2) Dynamic Adaptation: User behaviors evolve constantly, and interaction scenarios vary widely, leading to dynamic shifts in information security risks. Thus, security measures must be flexible, able to adapt to different threat levels and respond accordingly.
(3) Diversity in Coverage: Human-computer interaction involves diverse data types (text, voice, images, videos, etc.) and interaction modalities, each posing unique security challenges. Therefore, tailored security strategies and technical measures are necessary to address the specific risks associated with each data type and interaction mode.
(4) Complex System Integration: Human-computer interaction systems comprise intricate networks of interconnected components and subsystems, complicating information security efforts. Comprehensive security strategies and plans are required, taking into account the complexity of the system architecture and ensuring seamless integration.
(5) Data Correlation Awareness: The interconnectedness of user data with identity information heightens the risk of data breaches. A single leak can trigger a cascade effect, compromising additional user information. Hence, information security measures must be mindful of data correlations, enabling swift risk identification and containment.
(6) Collaborative Defense: Given the collaborative nature of human-computer interaction systems, where multiple components work in unison to achieve tasks, information security too must exhibit synergy. Components and subsystems must share security intelligence and resources, collaborating effectively to counter security threats and challenges.
Recognizing these characteristics underscores the importance of designing and implementing comprehensive, adaptable, and efficient information security strategies and plans that meticulously consider the multifaceted challenges inherent in human-computer interaction.
Zhenjie Bao
PhD candidate, Southeast University/School of cyber engineering
Areas of Expertise: Machine learning, cryptography, neural computing and applications, multimedia tools and applications, multimedia systems, cluster computing
Brief Introduction: Zhenjie Bao has published many articles combining machine learning and cryptography in important journals and conferences, including 4 SCI papers published as the first author. At the same time, it has authorized two national invention patents related to machine learning and cryptography. He is also the reviewer of neural computing and applications, multimedia tools and applications, multimedia systems, cluster computing.