2021
DOI: 10.18280/ijsse.110409
|View full text |Cite
|
Sign up to set email alerts
|

Concept of Using Eye Tracking Technology to Assess and Ensure Cybersecurity, Functional Safety and Usability

Abstract: Eye tracking technology is based on tracking the trajectory of human eye movement. As a rule, it is implemented in the form of an additional device attached under the monitor or in the form of glasses. On the basis of a mathematical model, the focus of a person's attention is calculated and, accordingly, the user's visual route is built. Eye tracking technology is used to solve various problems, e.g. for marketing research, assessing the quality of user interfaces, developing simulators for operators, etc. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 6 publications
0
3
0
1
Order By: Relevance
“…By itself, we arrange the fuzzy relation R according to levels and get (8): R=αRα=0.76R0.760.81R0.810.84R0.84 0.85R0.850.86R0.860.87R0.870.88R0.880.91R0.910.95R0.95R1 (8) Level  relations with graphs are presented in Table 7. As a result, we have the fact that the ratio -level forms the classes of information protection threats the cyber security system that are equivalent in importance to us (Table 8).…”
Section: Results Of Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…By itself, we arrange the fuzzy relation R according to levels and get (8): R=αRα=0.76R0.760.81R0.810.84R0.84 0.85R0.850.86R0.860.87R0.870.88R0.880.91R0.910.95R0.95R1 (8) Level  relations with graphs are presented in Table 7. As a result, we have the fact that the ratio -level forms the classes of information protection threats the cyber security system that are equivalent in importance to us (Table 8).…”
Section: Results Of Researchmentioning
confidence: 99%
“…As most scientists note [7][8][9], in today's globalized world, information and databases are those unique resources without the use and preservation of which it is impossible to exist and develop both a modern state, as a socio-political entity, and the fulfillment of purely military tasks to preserve independence. and defense of the country.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Also, in the literature it is noted by [9]; Musman, Turner, (2018) [10]; Martinez, Duran, (2021) [11]; Gorbieiev, et.al. (2021) [12] that the development of information and communication technologies, determined by the growth of traffic and the need of consumers for the emergence of new services, leads to the need for constant growth and modernization of telecommunication systems and networks. In recent years, video information services such as video telephony, video conferencing, broadcasting of television programs, and video on demand have become the most in demand.…”
Section: Literature Reviewmentioning
confidence: 99%
“…В умовах глобалізації інформаційних процесів, їх інтеграції в різні сфери суспільного життя керівництво провідних держав світу приділяє особливу увагу створенню та вдосконаленню ефективних систем державного управління та захисту критичної інфраструктури від зовнішнього та внутрішнього впливу [11].…”
unclassified