• No results found

Usable Security (Computer Security)

Usable Security and E-Banking: ease of use vis-a-vis security

Usable Security and E-Banking: ease of use vis-a-vis security

... of usable secure systems are illustrated in Table ...of security in the sense that they are aware of the existence and importance of ...because security is critically dependent on steps and ...

14

Assessing usable security of multifactor authentication

Assessing usable security of multifactor authentication

... The first step in designing an experiment is defining its broad aim. The aim of the present experimental study was to assess the usable security of different multifactor mechanisms. The second step involves ...

241

Consuming versus authoring : reflections on video assignments for usable security

Consuming versus authoring : reflections on video assignments for usable security

... Abstract. This paper reports on two cases of introducing assignments into two different computing courses related to Usable Security that re- quired students to create and submit videos. Analysis of these ...

9

Title: USABLE SECURITY AND PRIVACY IN SMART PHONES

Title: USABLE SECURITY AND PRIVACY IN SMART PHONES

... Conventionally Security means providing defense against attacks like Interruption, Modification, Integrity, Authentication, Availability ...and security becomes hard to understand for these users and also ...

7

Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications

Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications

... As part of this program we have begun to design new approaches to integrating security technology into applications, as well as new basic security technologies t h a t enhan[r] ...

8

Andrew Bragdon CS166: USABLE SECURITY

Andrew Bragdon CS166: USABLE SECURITY

... You've been warned: an empirical study of the effectiveness of web browser phishing warnings.. STUDY METHODOLOGY[r] ...

53

Design Considerations for Secure and Usable Authentication on Situated Displays

Design Considerations for Secure and Usable Authentication on Situated Displays

... Users often need to authenticate at situated displays in or- der to, for example, make purchases, access sensitive in- formation, or confirm an identity. However, the exposure of interactions in public spaces introduces ...

8

Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security

Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security

... designing usable security, they are in the area of (a) user motivation, and (b) a method that integrates the different aspects that affect usability of ...make security instructions more persuasive ...

25

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay

... Compared to having participants create a password under a strict policy in a single step, both the guidance and insertion techniques led to a reduction in password security. While user senti- ment toward the ...

162

How Usable Are the Learning Management Systems? The Users Have their Say

How Usable Are the Learning Management Systems? The Users Have their Say

... E-learning is an innovative way of learning that is both symbolic and derivative of ‘the information age.’ When used as part of the learning process, it provides users with greater flexibility in terms of time and ...

9

A Usable Android Application Implementing Distributed Cryptography for Election Authorities

A Usable Android Application Implementing Distributed Cryptography for Election Authorities

... In order to check whether the authorities understand the security properties and security model of the application, it is important to be very precise about both. The identified properties relevant for the ...

7

Salt tolerant trees usable for Central European cities – Review

Salt tolerant trees usable for Central European cities – Review

... Šerá B. (2017): Salt-tolerant trees usable for Central European cities – A review. Hort. Sci. (Prague), 44: 43–48. The present text is focused on an actual problem of planting of inappropriate tree taxa in many ...

6

Re usable online assessment materials for teaching artificial intelligence

Re usable online assessment materials for teaching artificial intelligence

... To give an example, in the next academic year it is intended to extend the range of questions, and provide extra voluntary tests for students who wish to either extend their knowledge of[r] ...

9

Designing a Re Usable Coordination Module for Cooperative Industrial Control Applications

Designing a Re Usable Coordination Module for Cooperative Industrial Control Applications

... So, for example, if the submodule processing messages from the HLCM is chosen, it may decide to process all of the messages corresponding to replies for information which have been made [r] ...

12

Toward Safe and Usable Technologies for Autistic: Risks Identification and  Mitigation Guidelines

Toward Safe and Usable Technologies for Autistic: Risks Identification and Mitigation Guidelines

... In Table 1, we established a roadmap that provides the guidelines for stake- holders to apply technology and advanced algorithms in different ASD dedicated solution. Main potential application scenarios are defined, ...

19

Prediction of the aerodynamic performance of re-usable single stage to orbit vehicles

Prediction of the aerodynamic performance of re-usable single stage to orbit vehicles

... generation of materials that are capable of resisting the temperatures of re-entry are structurally rather inefficient (having a low strength to mass ratio or being brittle or sensitive to impact) and hence to reduce the ...

11

Harvesting Re usable High level Rules for Expository Dialogue Generation

Harvesting Re usable High level Rules for Expository Dialogue Generation

... We found differences between authors in several respects, specifically: • number of turns per simple rule • number of dialogue acts per simple rule • combination of speaker roles and dia[r] ...

10

A Step Towards Usable Privacy Policy: Automatic Alignment of Privacy Statements

A Step Towards Usable Privacy Policy: Automatic Alignment of Privacy Statements

... and security have made various attempts to standardize the format of privacy notices, so that they are easier to understand and to allow the general public to have better control of their personal ...

11

Making Human Computer Interaction Usable: Thinking from Healthcare Perspective

Making Human Computer Interaction Usable: Thinking from Healthcare Perspective

... The effectiveness of Human Computer Interation depend upon certain important parameters such as usability and comfortability, which would encourage the end-users to get the services safely and more reliably. It becomes ...

7

Usable Speech Assignment for Speaker Identification under Co Channel Situation

Usable Speech Assignment for Speaker Identification under Co Channel Situation

... Here, we evaluate the performance of our speaker assignment system. For this evaluation, we only consider co-channel mixtures with overall TIR equal to 0 dB to simulate real co-channel situations. Table I present ...

5

Show all 10000 documents...

Related subjects