Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








12,189 Hits in 4.9 sec

Security and usability

Mohammad Mannan, P. C. van Oorschot
2008 Proceedings of the 2007 Workshop on New Security Paradigms - NSPW '07  
This work is intended to spur a discussion on real-world system security and user responsibilities, in a scenario where everyday users are heavily encouraged to perform critical tasks over the Internet  ...  We examine some of these requirements as set by major Canadian banks, in terms of security and usability.  ...  The second author is Canada Research Chair in Network and Software Security, and is supported in part by an NSERC Discovery Grant, and the Canada Research Chairs Program.  ... 
doi:10.1145/1600176.1600178 dblp:conf/nspw/MannanO07 fatcat:5h5r5hzkkzcdtmtpb2jgo3xi6i

Assessing Usable Security of Multifactor Authentication

Maha M. Althobaiti, Pam Mayhew
2015 Journal of Internet Technology and Secured Transaction  
In our complex experiment with 100 online banking customers, we simulate an original online banking platform based on the proposed approach; then, we evaluate the usability and security of three different  ...  However, developing a usable, secure authentication approach and method is the most challenging area for researchers in the fields of security and Human-Computer Interaction (HCI).  ...  In the domain of usability studies, the aim is usually to encourage users to behave as they do in the real world so the most accurate results can be obtained.  ... 
doi:10.20533/jitst.2046.3723.2015.0053 fatcat:bb6pmsjggbb4ll7nanj47cb7rq

Usable security and privacy

Carolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng
2005 Proceedings of the 2005 symposium on Usable privacy and security - SOUPS '05  
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980's and 1990's.  ...  We believe that there will be an increasing awareness of a fundamental need to address privacy concerns in information technology, and that doing so will require an understanding of policies that govern  ...  In a world with more and more reports of security and privacy risks and breaches, the importance of creating usable security and privacy solutions is increasing.  ... 
doi:10.1145/1073001.1073005 dblp:conf/soups/BrodieKKF05 fatcat:sfncx3kyybgxfojimpzw7nwsjq

A Review of Gaps between Usability and Security/Privacy

Majed Alshamari
2016 International Journal of Communications, Network and System Sciences  
The fields of e-banking and social networks have been considered specifically for identification of gaps in these particular fields.  ...  This paper examines the differences between usability factors and aspects related to security and privacy.  ...  Bridging the Gaps between Usability and Privacy/Security In the previous section, we highlighted the gaps and conflicts between security/privacy and usability.  ... 
doi:10.4236/ijcns.2016.910034 fatcat:6rol26nmanebpd2ecimvx3xeiy

Towards Usable and Secure Location-based Smartphone Authentication

Geumhwan Cho, Sungsu Kwag, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim
2021 Symposium On Usable Privacy and Security  
We then conducted a field study with 29 participants and a fully-functioning application to study real-world usage behaviors.  ...  To date, however, not much research has been conducted on investigating security and usability requirements for designing such location-based authentication services.  ...  Acknowledgments This work was supported by Samsung Research, NRFK (2019R1C1C1007118) and IITP (2019-0-01343). The authors would like to thank all the anonymous reviewers.  ... 
dblp:conf/soups/ChoKHKLK21 fatcat:de5owmzntzdkjnyoygbl7jfau4

Banking Websites in Turkey: an Accessibility, Usability and Security Evaluation

YAKUP AKGÜL
2018 İşletme Araştırmaları Dergisi  
The information in bank web sites, which are broadly assumed in numerous nations, must be accessible for all people, easy to use, exact and secure.  ...  In this way, websites and mobile applications should be usable, accessible, well coded, secured and mobile-device ready.  ...  Great effort is needed for bank web sites in the Turkey to improve accessibility, usability and security.  ... 
doi:10.20491/isarder.2018.396 fatcat:qvo2yp7r55e4jhwrfatuyng24e

Web wallet

Min Wu, Robert C. Miller, Greg Little
2006 Proceedings of the second symposium on Usable privacy and security - SOUPS '06  
In the study, it significantly decreased the spoof rate of typical phishing attacks from 63% to 7%, and it effectively prevented all phishing attacks as long as it was used.  ...  It integrates security questions into the user's workflow so that its protection cannot be ignored by the user.  ...  This work was supported in part by the National Science Foundation (award number IIS-0447800).  ... 
doi:10.1145/1143120.1143133 dblp:conf/soups/WuML06 fatcat:ujn6dlhvdvahrhi65p7pbwromm

Crowdsourcing Attacks on Biometric Systems

Saurabh Panjwani, Achintya Prakash
2014 Symposium On Usable Privacy and Security  
We discuss implications of our results for the security analysis of SV systems (and of biometric systems, in general) and highlight benefits and challenges associated with the use of crowdsourcing in such  ...  threat to real systems.  ...  and banks elsewhere in the world are also moving in that direction [25] 4 .  ... 
dblp:conf/soups/PanjwaniP14 fatcat:dh7krevjrbahzf2yjmruphohpe

User Perceptions of Sharing, Advertising, and Tracking

Farah Chanchary, Sonia Chiasson
2015 Symposium On Usable Privacy and Security  
We presented results of 368 participant responses across four types of websites -an online banking site, an online shopping site, a search engine and a social networking site.  ...  In general, we identified that participants had positive responses for OBA and that they demonstrated clear preferences for which classes of information they would like to disclose online.  ...  Symposium on Usable Privacy and Security (SOUPS) 2015, July 22-24, 2015, Ottawa, Canada. Leon et al.  ... 
dblp:conf/soups/ChancharyC15 fatcat:lsfvk2frgnhcdbn6hticac43uy

Usability and Security of Text Passwords on Mobile Devices

William Melicher, Michelle L. Mazurek, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
2016 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16  
We compare the strength and usability of passwords created and used on mobile devices with those created and used on desktops and laptops, while varying password policy requirements and input methods.  ...  However, this research has generally been in the context of desktops and laptops, while users are increasingly creating and entering passwords on mobile devices.  ...  This research was supported in part by NSF grants DGE-0903659 and CNS-1116776 and gifts from the PNC Center for Financial Services Innovation and Microsoft Research.  ... 
doi:10.1145/2858036.2858384 dblp:conf/chi/MelicherKSKSUBC16 fatcat:5kmmsdwzingolh7e7433ujobi4

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking

Nancie Gunson, Diarmid Marshall, Hazel Morton, Mervyn Jack
2011 Computers & security  
of a real-world automated telephone banking service.  ...  Online banking fraud, on the other hand, rose by 55% in the same period (presumably in part as a consequence of the Chip and PIN initiative).  ... 
doi:10.1016/j.cose.2010.12.001 fatcat:jnmjisgolnhtvkie7vr57xwwo4

Skills and Characteristics of Successful Cybersecurity Advocates

Julie M. Haney, Wayne G. Lutters
2017 Symposium On Usable Privacy and Security  
Cybersecurity advocates attempt to counter the tsunami of cyber attacks by promoting security best practices and encouraging security technology adoption.  ...  Additionally, the cybersecurity profession neglects to frame the field as service-oriented, a theme identified repeatedly in our interviews.  ...  Cybersecurity Advocate Education Advocates tend to be more advanced in their careers, having built on prior real-world experience.  ... 
dblp:conf/soups/HaneyL17 fatcat:hsjsvkgeofbjnnrglof4nbmqim

User, Usage and Usability: Redefining Human Centric Cyber Security

Marthie Grobler, Raj Gaire, Surya Nepal
2021 Frontiers in Big Data  
In this paper, we survey advancements made in the development and design of the human centric cyber security domain.  ...  We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U's) as three essential components for cyber security consideration, and classify developmental  ...  Furthermore, organizations to a large extent follow a tick the box approach, with no real consideration for the real intention in terms of cyber security.  ... 
doi:10.3389/fdata.2021.583723 pmid:33748750 pmcid:PMC7968726 fatcat:y4aztmzsfjbzpfpiroomhmuhjm

Folk models of home computer security

Rick Wash
2010 Proceedings of the Sixth Symposium on Usable Privacy and Security - SOUPS '10  
The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties.  ...  Finally, I describe one reason why botnets are so difficult to eliminate: they cleverly take advantage of gaps in these models so that many home computer users do not take steps to protect against them  ...  Folk models are mental models that are not necessarily accurate in the real world, thus leading to erroneous decision making, but are shared among similar members of a culture [11] .  ... 
doi:10.1145/1837110.1837125 dblp:conf/soups/Wash10 fatcat:6rnvhr6vkncwlnlripmqi5fbdi

"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security

Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, Sara B. Kiesler
2015 Symposium On Usable Privacy and Security  
Despite these differences, we did not find a direct relationship between people's technical background and the actions they took to control their privacy or increase their security online.  ...  We undertook a qualitative study to understand what people do and do not know about the Internet and how that knowledge affects their responses to privacy and security risks.  ...  the XIA project for their feedback and suggestions.  ... 
dblp:conf/soups/KangDFK15 fatcat:77irzhzvmnghfba34ejnetoywa
« Previous Showing results 1 — 15 out of 12,189 results