Results 31 to 40 of about 247,400 (347)
Pastures: Towards usable security policy engineering [PDF]
Whether a particular computing installation meets its security goals depends on whether the administrators can create a policy that expresses these goals—security in practice requires effective policy engineering.
Alex Ferguson +3 more
core +3 more sources
An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away.
Verena Distler +4 more
doaj +1 more source
Evaluating Security Tools towards Usable Security [PDF]
The main success of the internet is its openness. To guarantee security in the internet — for example to protect the user’s privacy — the use of security tools is essential. Because today’s internet users cover almost all educational levels and professional groups, we assume that in most cases they will be security novices.
Kaiser, Johannes, Reichenbach, Martin
openaire +2 more sources
ABSTRACT The pediatric hematology‐oncology fellowship training curriculum has not substantially changed since its inception. The first year of training is clinically focused, and the second and third years are devoted to scholarship. However, this current structure leaves many fellows less competitive in the current job market, resulting in ...
Scott C. Borinstein +3 more
wiley +1 more source
From usable design characteristics to usable information security policies: a reconceptualisation
Information Security Policies (ISPs) are crucial artefacts in organisations, governments, and civil societies to mitigate information security threats and risks.
Lawo Dennis, Stevens Gunnar
doaj +1 more source
Towards a Collection of Security and Privacy Patterns
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services.
Manos Papoutsakis +4 more
doaj +1 more source
Ignore These At Your Peril: Ten principles for trust design [PDF]
Online trust has been discussed for more than 10 years, yet little practical guidance has emerged that has proven to be applicable across contexts or useful in the long run. 'Trustworthy UI design guidelines' created in the late 90ies to address the then
Riegelsberger, J, Sasse, MA
core
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Security and Online learning: to protect or prohibit [PDF]
The rapid development of online learning is opening up many new learning opportunities. Yet, with this increased potential come a myriad of risks. Usable security systems are essential as poor usability in security can result in excluding intended users ...
Adams, Anne, Blandford, Ann
core +1 more source
Usability of Humanly Computable Passwords
Reusing passwords across multiple websites is a common practice that compromises security. Recently, Blum and Vempala have proposed password strategies to help people calculate, in their heads, passwords for different sites without dependence on third ...
Kalai, Adam Tauman +2 more
core +1 more source

