Results 11 to 20 of about 247,400 (347)

Secure Email - A Usability Study [PDF]

open access: yes, 2020
Several end-to-end encryption technologies for emails such as PGP and S/MIME exist since decades. However, end-to-end encryption is barely applied. To understand why users hesitate to secure their email communication and which usability issues they face with PGP, S/MIME as well as with pEp (Pretty Easy Privacy), a fairly new technology, we conducted an
Reuter, Adrian   +4 more
openaire   +3 more sources

A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software

open access: yesIEEE Access, 2020
The main idea for practicing research towards security is to maintain usability of the software as well. This can be achieved by making less complex and high secure software.
Rajeev Kumar   +6 more
doaj   +1 more source

Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science [PDF]

open access: yes, 2009
e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users.
Flechais, I, Sasse, MA
core   +2 more sources

Usable Security [PDF]

open access: yes, 2018
The increased availability of information and services has led to the affirmation of the internet involvement for a large segment of the population. This implies a paradigm shift for computer security: users become less skilled and security aware, requiring easier interface to communicate with “the machine” and more specific and comprehensible security
ATZENI, ANDREA, Faily S., Galloni R.
openaire   +2 more sources

Harnessing the Challenges and Solutions to Improve Security Warnings: A Review

open access: yesSensors, 2021
The security warning is a representation of communication that is used to warn and to inform a person whether security menaces have been discovered in order to prevent any consequences of damage from taking place.
Zarul Fitri Zaaba   +3 more
doaj   +1 more source

Integrating security and usability into the requirements and design process [PDF]

open access: yes, 2006
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core   +1 more source

Security awareness and affective feedback:categorical behaviour vs. reported behaviour [PDF]

open access: yes, 2017
A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship ...
Archibald, Jacqueline   +1 more
core   +4 more sources

Design as Code: Facilitating Collaboration between Usability and Security Engineers using CAIRIS [PDF]

open access: yes, 2017
Designing usable and secure software is hard with- out tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports
Faily, Shamal, Iacob, C.
core   +9 more sources

Barriers to Usable Security? Three Organizational Case Studies [PDF]

open access: yes, 2016
Usable security assumes that when security functions are more usable, people are more likely to use them, leading to an improvement in overall security. Existing software design and engineering processes provide little guidance for leveraging this in the
Ammann, P   +5 more
core   +1 more source

Usability Study on Textual and Graphical Passwords

open access: yesThe Proceedings of the Nigerian Academy of Science, 2022
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or information systems could be an overwhelming task especially when it comes ...
Toluwase B. Ologundudu   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy