Results 301 to 310 of about 247,400 (347)
Some of the next articles are maybe not open access.
2012
We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to ...
N. Asokan, Cynthia Kuo
openaire +1 more source
We make the case for usable mobile security by outlining why usable security in mobile devices is important and why it is hard to achieve. We describe a number of current problems in mobile devices that need usable and secure solutions. Finally, we discuss the characteristics of mobile devices that can actually help in designing usable solutions to ...
N. Asokan, Cynthia Kuo
openaire +1 more source
Datenschutz und Datensicherheit - DuD, 2010
Bedienbarkeit, Verstandlichkeit und Akzeptanz von Schutzmechanismen stehen bei deren Entwicklung in der Regel nicht im Vordergrund — obwohl sie nachweislich einen erheblichen Einfluss auf das (sicherheitsadaquate) Verhalten der Nutzer haben. Die Autoren geben einen uberblick uber die bisherigen Ansatze auf dem Gebiet „Usable Security and Privacy“ und ...
Simone Fischer-Hübner +2 more
openaire +1 more source
Bedienbarkeit, Verstandlichkeit und Akzeptanz von Schutzmechanismen stehen bei deren Entwicklung in der Regel nicht im Vordergrund — obwohl sie nachweislich einen erheblichen Einfluss auf das (sicherheitsadaquate) Verhalten der Nutzer haben. Die Autoren geben einen uberblick uber die bisherigen Ansatze auf dem Gebiet „Usable Security and Privacy“ und ...
Simone Fischer-Hübner +2 more
openaire +1 more source
Usability and Security Patterns
2009 Second International Conferences on Advances in Computer-Human Interactions, 2009Some authors argue that it can be complicated to build systems with both usability and security, but the reality is that there is no real conflict between these two properties. Certainly, it takes more work to build systems that have the properties of usability and security, but in many cases it is a matter of doing just a good job not miracles.
Andrei Ferreira +2 more
openaire +1 more source
Usability stumm geschaltet? Usable Security und Privacy in Videokonferenzsystemen
2022Unter Druck von außen durch die COVID-19-Pandemie erfuhren Unternehmen weltweit einen Aufschwung in der Nutzungsbilanz von Werkzeugen für computergestützte Gruppenarbeit. Die sogenannte Computer Supported Cooperative Work (CSCW) ermöglichte trotz Kontaktbeschränkungen die Arbeit in Gruppen durch digitale Informations- und Kommunikationstechnologien ...
Balthasar, Mandy +2 more
openaire +1 more source
Aligning usability and security
Proceedings of the second symposium on Usable privacy and security - SOUPS '06, 2006Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software 'Polaris'. This software is an alpha release that uses the Principle of Least Authority (POLA) to deny viruses the authority to edit files. Polaris was designed to align security with
Alexander J. DeWitt, Jasna Kuljis
openaire +1 more source
8. Usable Security und PrivacyWorkshop
2022Ziel der achten Auflage des wissenschaftlichen Workshops “Usable Security and Privacy” auf der Mensch und Computer 2022 ist es, aktuelle Forschungs- und Praxisbeiträge zu präsentieren und anschließend mit den Teilnehmenden zu diskutieren. Der Workshop soll ein etabliertes Forum fortführen und weiterentwickeln, in dem sich Experten aus verschiedenen ...
Lo Iacono, Luigi +3 more
openaire +1 more source
System security, platform security and usability
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010Scalable trusted computing seeks to apply and extend the fundamental technologies of trusted computing to large-scale systems. To provide the functionality demanded by users, bootstrapping a trusted platform is but the first of many steps in a complex, evolving mesh of components.
openaire +1 more source
Usability and Security An Appraisal of Usability Issues in Information Security Methods
Computers & Security, 2001In the modern multi-user computer environment, Internet-capable network servers provide connectivity that allows a large portion of the user population to access information at the desktop from sources around the world. Because of the ease with which information can be accessed, computer security breaches may occur unless systems and restricted ...
E.Eugene Schultz +3 more
openaire +1 more source
2012
Usability issues in security have been discussed such that users could use the security tools easier. On contrary we presume another aspect of usability issues in security; an interface which causes a slight disturbance and discomfort so that a user would be aware of security threats and risks.
Yuko Murayama +3 more
openaire +1 more source
Usability issues in security have been discussed such that users could use the security tools easier. On contrary we presume another aspect of usability issues in security; an interface which causes a slight disturbance and discomfort so that a user would be aware of security threats and risks.
Yuko Murayama +3 more
openaire +1 more source
Proceedings of the 18th international conference on Association Francophone d'Interaction Homme-Machine - IHM '06, 2006
The usability of security systems has become a major issue in research on the efficiency and user acceptance of security systems. The authentication process is essential for controlling the access to various resources and facilities. The design of usable yet secure user authentication methods raises crucial questions concerning how to solve conflicts ...
Christina Braz, Jean-Marc Robert
openaire +1 more source
The usability of security systems has become a major issue in research on the efficiency and user acceptance of security systems. The authentication process is essential for controlling the access to various resources and facilities. The design of usable yet secure user authentication methods raises crucial questions concerning how to solve conflicts ...
Christina Braz, Jean-Marc Robert
openaire +1 more source

