Results 291 to 300 of about 247,400 (347)

Co-Design of a Digital Health Platform for Chronic Disease Management in Rural Settings Using a Person-Centered, Collaborative-Care Model: Protocol for a 3-Phase Mixed Methods Study.

open access: yesJMIR Res Protoc
Young AE   +14 more
europepmc   +1 more source

Self-Determined Health App Evaluation Questionnaire Development: Mixed Methods Study.

open access: yesJMIR Hum Factors
Rzepka A   +5 more
europepmc   +1 more source

Security Usability

IEEE Security and Privacy Magazine, 2005
In the security community, we have always recognized that our security proposals come with certain costs in terms of usability. To properly deliver security, we must scrap the assumption of a usability compromise. The primary goal for current security efforts should not be to further refine how many key bits can fit on the head of a pin, but to figure ...
P. Gutmann, I. Grigg
openaire   +1 more source

Usable Security

IEEE Internet Computing, 2017
Protecting computing systems involves the efforts of a large number of people. However, the connection between people and computers is often the biggest vulnerability in the system. This issue includes seven papers that describe how people protect computing systems, and the challenges and opportunities they provide.
Rick Wash, Mary Ellen Zurko
openaire   +1 more source

Security and usability

Proceedings of the 2007 Workshop on New Security Paradigms, 2008
Online banking is one of the most sensitive tasks performed by general Internet users. Most traditional banks now offer online banking services, and strongly encourage customers to do online banking with 'peace of mind.' Although banks heavily advertise an apparent '100% online security guarantee,' typically the fine print makes this conditional on ...
Mohammad Mannan, P. C. van Oorschot
openaire   +1 more source

Usable security and privacy

Proceedings of the 2005 symposium on Usable privacy and security - SOUPS '05, 2005
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980's and 1990's. Design to make information easily accessible, without particular attention to issues such as whether an individual had a desire or right to control access to and use of particular information was ...
Carolyn Brodie   +3 more
openaire   +1 more source

Usable-Security Evaluation

2015
Developing software products which align security and usability to make a synergistic relationship between security and usability is an engineering process that starts from the first phase of the Software Development Life-Cycle SDLC, and continues through the rest of the phases: design, construction, and testing. However, a summative evaluation of such
Yasser M. Hausawi, William H. Allen
openaire   +1 more source

Home - About - Disclaimer - Privacy