Results 31 to 40 of about 247,400 (347)

Pastures: Towards usable security policy engineering [PDF]

open access: yes, 2007
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice requires effective policy engineering.
Alex Ferguson   +3 more
core   +3 more sources

Complex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment

open access: yesComputers in Human Behavior Reports, 2022
An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away.
Verena Distler   +4 more
doaj   +1 more source

Evaluating Security Tools towards Usable Security [PDF]

open access: yes, 2002
The main success of the internet is its openness. To guarantee security in the internet — for example to protect the user’s privacy — the use of security tools is essential. Because today’s internet users cover almost all educational levels and professional groups, we assume that in most cases they will be security novices.
Kaiser, Johannes, Reichenbach, Martin
openaire   +2 more sources

Personalizing the Pediatric Hematology/Oncology Fellowship: Adapting Training for the Next Generation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein   +3 more
wiley   +1 more source

From usable design characteristics to usable information security policies: a reconceptualisation

open access: yesi-com
Information Security Policies (ISPs) are crucial artefacts in organisations, governments, and civil societies to mitigate information security threats and risks.
Lawo Dennis, Stevens Gunnar
doaj   +1 more source

Towards a Collection of Security and Privacy Patterns

open access: yesApplied Sciences, 2021
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services.
Manos Papoutsakis   +4 more
doaj   +1 more source

Ignore These At Your Peril: Ten principles for trust design [PDF]

open access: yes, 2010
Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then
Riegelsberger, J, Sasse, MA
core  

Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus   +6 more
wiley   +1 more source

Security and Online learning: to protect or prohibit [PDF]

open access: yes, 2003
The rapid development of online learning is opening up many new learning opportunities. Yet, with this increased potential come a myriad of risks. Usable security systems are essential as poor usability in security can result in excluding intended users ...
Adams, Anne, Blandford, Ann
core   +1 more source

Usability of Humanly Computable Passwords

open access: yes, 2018
Reusing passwords across multiple websites is a common practice that compromises security. Recently, Blum and Vempala have proposed password strategies to help people calculate, in their heads, passwords for different sites without dependence on third ...
Kalai, Adam Tauman   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy