Publication statistics

Pub. period:2006-2011
Pub. count:14
Number of co-authors:31


Number of publications with 3 favourite co-authors:

Florence Balagtas-F..:
Max Tafelmayer:
Stefan Sauer:



Productive colleagues

Heinrich Hussmann's 3 most productive colleagues in number of publications:

Albrecht Schmidt:107
Alexander De Luca:27
Paul Holleis:20

Upcoming Courses

go to course
Quality Web Communication: The Beginner's Guide
Starts tomorrow LAST CALL!
go to course
UI Design Patterns for Successful Software
90% booked. Starts in 5 days

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !


Our Latest Books

The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading

Heinrich Hussmann


Publications by Heinrich Hussmann (bibliography)

 what's this?
Edit | Del

Luca, Alexander De, Frauendienst, Bernhard, Maurer, Max-Emanuel, Seifert, Julian, Hausen, Doris, Kammerer, Niels and Hussmann, Heinrich (2011): Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 887-890.

Internet users are targets for ever-advancing phishing- and other attacks. The risks are, for example, to disclose credit card information or passwords to unauthorized instances. One approach to help users with insecure situations is provided by MoodyBoard, which uses ambient information to highlight potential risks. In this paper, we present findings from an evaluation of this system. Two user studies were conducted in order to find out whether an ambient security tool can protect users during sensitive tasks. We designed a pilot study to find out whether users understand the warnings and a security study to see if it helps to protect users from phishing attacks. Results show that MoodyBoard users behaved significantly more secure.

© All rights reserved Luca et al. and/or their publisher

Edit | Del

Maurer, Max-Emanuel, Luca, Alexander De and Hussmann, Heinrich (2011): Data type based security alert dialogs. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2359-2364.

Making users aware of insecure situations and behavior while browsing the Internet is a highly discussed and still difficult task. Both, passive and active warnings have their own specific disadvantages. While active warnings interrupt the current task and annoy the user, passive approaches often fail since they go unnoticed. In this work, we present first results of a concept displaying data type based alert dialogs whenever a user enters critical information into an online form. Such contextual dialogs appear right in the users' field of view representing a hybrid approach between active and passive warnings. An initial user study was conducted that showed a significant improvement of security awareness by participants that used the tool.

© All rights reserved Maurer et al. and/or their publisher

Edit | Del

Conradi, Bettina, Lerch, Verena, Hommer, Martin, Kowalski, Robert, Vletsou, Ioanna and Hussmann, Heinrich (2011): Flow of electrons: an augmented workspace for learning physical computing experientially. In: Proceedings of the 2011 ACM International Conference on Interactive Tabletops and Surfaces 2011. pp. 182-191.

Physical computing empowers people to design and customize electronic hardware tailored to their individual needs. This often involves "tinkering" with components connections, but due to the intangible nature of electricity, this can be difficult, especially for novices. We use a multistage design process to design, build and evaluate a physical prototyping workspace for novices to learn about real physical computing hardware. The workspace consists of a horizontal surface that tracks physical components like sensors, actuators, and microcontroller boards and augments them with additional digital information in situ. By digitally exploring various means of connecting components, users can experientially learn how to build a functioning circuit and then transition directly to building it physically. In a user study, we found that this system motivates learners by encouraging them and building a sense of competence, while also providing a stimulating experience.

© All rights reserved Conradi et al. and/or ACM Press

Edit | Del

Maurer, Max-Emanuel, Hausen, Doris, Luca, Alexander De and Hussmann, Heinrich (2010): Mobile or desktop websites?: website usage on multitouch devices. In: Proceedings of the Sixth Nordic Conference on Human-Computer Interaction 2010. pp. 739-742.

Mobile Internet is nearly a standard nowadays. Due to former bandwidth, input and screen limitations, website providers often created special versions of their websites for mobile devices. New hardware and interactions techniques like multitouch gestures enable a new way of browsing the original versions of websites. However, companies still spent effort and money in creating secondary versions of their original pages. With the rapid deployment of new mobile devices, the usefulness of mobile versions of websites becomes questionable. To investigate on users expectations, we conducted an online survey with 108 participants about their browsing habits and preferences on mobile devices. In a follow-up user study with 24 participants. The results of the survey show that more and more people prefer using original content instead of the mobile version, especially for users of new generation mobile devices like the iPhone or Android phones. Those results are supported by the user study, which shows no significant performance increase when comparing both versions -- the mobile and desktop one -- performing a visual search task.

© All rights reserved Maurer et al. and/or their publisher

Edit | Del

Streng, Sara, Stegmann, Karsten, Boring, Sebastian, Bohm, Sonja, Fischer, Frank and Hussmann, Heinrich (2010): Measuring effects of private and shared displays in small-group knowledge sharing processes. In: Proceedings of the Sixth Nordic Conference on Human-Computer Interaction 2010. pp. 789-792.

Knowledge sharing is important in every team or organization. Various tools are frequently used in meetings to support knowledge sharing, ranging from pen-and-paper to whiteboards and other shared workspaces. This paper reports on a user study that investigated how private and shared displays affect knowledge sharing processes in co-located meetings. Three setups were compared in a hidden-profile experiment: a distributed system providing a shared display and laptops (Note&Share), a regular whiteboard and pen-and-paper. The results show several advantages of the distributed system. For example, the group was more confident in the solution when using Note&Share. Furthermore the number of shared arguments was significantly closer to the correct number, which suggests that misunderstandings occurred less frequently. Finally some interesting effects were observed, which we claim to be connected to the availability of pen-and-paper in all conditions. Therefore, we discuss the observed effects as well as general lessons learned from this experiment.

© All rights reserved Streng et al. and/or their publisher

Edit | Del

Luca, Alexander De, Langheinrich, Marc and Hussmann, Heinrich (2010): Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 16.

With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Those mechanisms are usually judged on speed, security, and memorability in comparison with traditional PIN entry systems. It remains unclear, however, what appropriate values for PIN-based ATM authentication actually are. We conducted a field study and two smaller follow-up studies on real-world ATM use, in order to provide both a better understanding of PIN-based ATM authentication, and on how alternative authentication methods can be compared and evaluated. Our results show that there is a big influence of contextual factors on security and performance in PIN-based ATM use. Such factors include distractions, physical hindrance, trust relationships, and memorability. From these findings, we draw several implications for the design of alternative ATM authentication systems, such as resilience to distraction and social compatibility.

© All rights reserved Luca et al. and/or their publisher

Edit | Del

Luca, Alexander De, Hertzschuch, Katja and Hussmann, Heinrich (2010): ColorPIN: securing PIN entry through indirect input. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 1103-1106.

Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that the main problem lies in the PIN based authentication which in itself does not provide any security features (besides the use of asterisks). That is, security is solely based on a user's behavior. Indirect input is one way to solve this problem. This mostly comes at the costs of adding overhead to the input process. We present ColorPIN, an authentication mechanism that uses indirect input to provide security enhanced PIN entry. At the same time, ColorPIN remains a one-to-one relationship between the length of the PIN and the required number of clicks. A user study showed that ColorPIN is significantly more secure than standard PIN entry while enabling good authentication speed in comparison with related systems.

© All rights reserved Luca et al. and/or their publisher

Edit | Del

Bergh, Jan Van den, Meixner, Gerrit, Breiner, Kai, Pleuss, Andreas, Sauer, Stefan and Hussmann, Heinrich (2010): Model-driven development of advanced user interfaces. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 4429-4432.

The workshop on model-driven development of advanced user interfaces will be a forum of multi-disciplinary discussion on how to integrate model-driven development with the often more informal methodologies used in user-centered design. Starting point of the discussion will be the tools, models, methods and experiences of the workshop participants.

© All rights reserved Bergh et al. and/or their publisher

Edit | Del

Balagtas-Fernandez, Florence, Tafelmayer, Max and Hussmann, Heinrich (2010): Mobia Modeler: easing the creation process of mobile applications for non-technical users. In: Proceedings of the 2010 International Conference on Intelligent User Interfaces 2010. pp. 269-272.

The development of mobile applications has now extended from mobile network providers into the hands of ordinary people as organizations and companies encourage people to come up with their own software masterpieces by opening up APIs and tools. However, as of the moment, these APIs and tools are only usable by people with programming skills. There is a scarcity of tools that enable users without programming experience to easily build customized mobile applications. We present in this paper a tool and its underlying framework that would enable non-technical people to create their own domain-specific mobile applications. As a proof of concept, we focus on the creation of applications in the domain of mobile health monitoring. In the future, we would like to extend our work to cover other domains as well.

© All rights reserved Balagtas-Fernandez et al. and/or their publisher

Edit | Del

Luca, Alexander De, Denzel, Martin and Hussmann, Heinrich (2009): Look into my eyes!: can you guess my password?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 7.

Authentication systems for public terminals and thus public spaces have to be fast, easy and secure. Security is of utmost importance since the public setting allows manifold attacks from simple shoulder surfing to advanced manipulations of the terminals. In this work, we present EyePassShapes, an eye tracking authentication method that has been designed to meet these requirements. Instead of using standard eye tracking input methods that require precise and expensive eye trackers, EyePassShapes uses eye gestures. This input method works well with data about the relative eye movement, which is much easier to detect than the precise position of the user's gaze and works with cheaper hardware. Different evaluations on technical aspects, usability, security and memorability show that EyePassShapes can significantly increase security while being easy to use and fast at the same time.

© All rights reserved Luca et al. and/or ACM Press

Edit | Del

Luca, Alexander De, Frauendienst, Bernhard, Boring, Sebastian and Hussmann, Heinrich (2009): My phone is my keypad: privacy-enhanced PIN-entry on public terminals. In: Proceedings of OZCHI09, the CHISIG Annual Conference on Human-Computer Interaction 2009. pp. 401-404.

More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations mostly aim at stealing the customers' authentication information (e.g. bank card PIN) to gain access to the victims' possessions. By relocating the input from the terminal to the users' mobile device, the system presented in this paper makes the authentication process resistant against such manipulations. In principle, this relocation makes PIN entry more complex, with a tendency to worse usability. In this paper, we present the concept as well as an evaluation that has been conducted to study the trade off between usability and security. The results show that users apparently are willing to accept a certain increase of interaction time in exchange for improved security.

© All rights reserved Luca et al. and/or their publisher

Edit | Del

Holleis, Paul, Otto, Friederike, Hussmann, Heinrich and Schmidt, Albrecht (2007): Keystroke-level model for advanced mobile phone interaction. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems 2007. pp. 1505-1514.

The design of applications using mobile devices needs a different quality assessment than those known for desktop applications. Of the many aspects that have to be taken into account, one important criterion is the average time users need to complete a task. For interactions with the mouse, keyboard or touch screens, there exist models that predict interaction times like Fitts' law or the Keystroke-Level Model (KLM). This paper shows parallels to these models for advanced interactions with mobile phones targeted at pervasive services, including near field communication as well as built-in cameras and sensors. Applications can be evaluated with respect to user performance time without having a prototype running on the phone. To accomplish that, we extend the known KLM by identifying basic interaction elements for mobile phones and give estimates for expert user performance derived from several user tests.

© All rights reserved Holleis et al. and/or ACM Press

Edit | Del

Luca, Alexander De, Weiss, Roman and Hussmann, Heinrich (2007): PassShape: stroke based shape passwords. In: Proceedings of OZCHI07, the CHISIG Annual Conference on Human-Computer Interaction November 28-30, 2007, Adelaide, Australia. pp. 239-240.

Authentication today mostly means using passwords or personal identification numbers (PINs). The average user has to remember an increasing amount of PINs and passwords. But unfortunately, humans have limited capabilities in remembering abstract alphanumeric sequences. Thus, many people either forget them or use very simple ones that imply several security risks. In our previous work on PIN entry on ATMs (cash machines), we found out that many persons support their memory recalling PINs by using an imaginary shape overlaid on the number pad. In this paper, we introduce PassShape, a shape based authentication mechanism. We argue that using shapes will allow more complex and more secure authentication with a lower cognitive load. That is, it enables people to use easy to remember but complex authentication patterns.

© All rights reserved Luca et al. and/or ACM Press

Edit | Del

Vitzthum, Arnd and Hussmann, Heinrich (2006): Modeling Augmented Reality User Interfaces with SSIML/AR. In Journal of Multimedia, 1 (3) pp. 13-22.

Add publication
Show list on your website

Join our community and advance:




Join our community!

Page Information

Page maintainer: The Editorial Team