Results 1 to 10 of about 247,400 (347)
Usable Security: A Systematic Literature Review
Usable security involves designing security measures that accommodate users’ needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be.
Francesco Di Nocera +2 more
doaj +3 more sources
Time series dataset for network security situational awarenessMendeley Data [PDF]
In the field of network security situational awareness (NSSA), it is challenging to find a usable dataset. Most of the datasets used in existing research papers are outdated, small, publicly unavailable due to the private infrastructure on which they ...
Richard Staňa +3 more
doaj +2 more sources
"I need a better description": An Investigation Into User Expectations For Differential Privacy
Despite recent widespread deployment of differential privacy, relatively little is known about what users think of differential privacy. In this work, we seek to explore users' privacy expectations related to differential privacy.
Rachel Cummings +2 more
doaj +3 more sources
The Influence of Avatar Personalization on Emotions in VR
In this paper, we investigate the impact of avatar personalization on perceived emotions. Avatar embodiment is a crucial aspect of collaborative and social virtual reality (VR) systems.
Rivu Radiah +3 more
doaj +1 more source
Multi-level Fuzzy system for usable-security assessment
Indubitably, security is an integral aspect of the development of quality software. More importantly, usability is also an elemental and pivotal factor for developing quality software.
Alka Agrawal +4 more
doaj +1 more source
Usable, Secure, Private Search [PDF]
Real-world applications commonly require untrusting parties to share sensitive information securely. This article describes a secure anonymous database search (SADS) system that provides exact keyword match capability. Using a new reroutable encryption and the ideas of Bloom filters and deterministic encryption, SADS lets multiple parties efficiently ...
Raykova, Mariana Petrova +6 more
openaire +2 more sources
Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment
Modern technology and the digitisation era accelerated the pace of data generation and collection for various purposes. The orchestration of such data is a daily challenge faced by even experienced professional users in the context of Internet of Things (
Anastasija Collen +4 more
doaj +1 more source
PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone
The security of financial apps on smartphones is threatened by a class of advanced and persistent malware that can bypass all existing security measures. Strong cryptography and trusted on-chip hardware modules are powerless against sophisticated attacks
Yonas Leguesse +3 more
doaj +1 more source
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user's ...
Rajeev Kumar +5 more
doaj +1 more source
Evaluation of Contextual and Game-Based Training for Phishing Detection
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical
Joakim Kävrestad +5 more
doaj +1 more source

