A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security and usability
2008
Proceedings of the 2007 Workshop on New Security Paradigms - NSPW '07
This work is intended to spur a discussion on real-world system security and user responsibilities, in a scenario where everyday users are heavily encouraged to perform critical tasks over the Internet ...
We examine some of these requirements as set by major Canadian banks, in terms of security and usability. ...
The second author is Canada Research Chair in Network and Software Security, and is supported in part by an NSERC Discovery Grant, and the Canada Research Chairs Program. ...
doi:10.1145/1600176.1600178
dblp:conf/nspw/MannanO07
fatcat:5h5r5hzkkzcdtmtpb2jgo3xi6i
Assessing Usable Security of Multifactor Authentication
2015
Journal of Internet Technology and Secured Transaction
In our complex experiment with 100 online banking customers, we simulate an original online banking platform based on the proposed approach; then, we evaluate the usability and security of three different ...
However, developing a usable, secure authentication approach and method is the most challenging area for researchers in the fields of security and Human-Computer Interaction (HCI). ...
In the domain of usability studies, the aim is usually to encourage users to behave as they do in the real world so the most accurate results can be obtained. ...
doi:10.20533/jitst.2046.3723.2015.0053
fatcat:bb6pmsjggbb4ll7nanj47cb7rq
Usable security and privacy
2005
Proceedings of the 2005 symposium on Usable privacy and security - SOUPS '05
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980's and 1990's. ...
We believe that there will be an increasing awareness of a fundamental need to address privacy concerns in information technology, and that doing so will require an understanding of policies that govern ...
In a world with more and more reports of security and privacy risks and breaches, the importance of creating usable security and privacy solutions is increasing. ...
doi:10.1145/1073001.1073005
dblp:conf/soups/BrodieKKF05
fatcat:sfncx3kyybgxfojimpzw7nwsjq
A Review of Gaps between Usability and Security/Privacy
2016
International Journal of Communications, Network and System Sciences
The fields of e-banking and social networks have been considered specifically for identification of gaps in these particular fields. ...
This paper examines the differences between usability factors and aspects related to security and privacy. ...
Bridging the Gaps between Usability and Privacy/Security In the previous section, we highlighted the gaps and conflicts between security/privacy and usability. ...
doi:10.4236/ijcns.2016.910034
fatcat:6rol26nmanebpd2ecimvx3xeiy
Towards Usable and Secure Location-based Smartphone Authentication
2021
Symposium On Usable Privacy and Security
We then conducted a field study with 29 participants and a fully-functioning application to study real-world usage behaviors. ...
To date, however, not much research has been conducted on investigating security and usability requirements for designing such location-based authentication services. ...
Acknowledgments This work was supported by Samsung Research, NRFK (2019R1C1C1007118) and IITP (2019-0-01343). The authors would like to thank all the anonymous reviewers. ...
dblp:conf/soups/ChoKHKLK21
fatcat:de5owmzntzdkjnyoygbl7jfau4
Banking Websites in Turkey: an Accessibility, Usability and Security Evaluation
2018
İşletme Araştırmaları Dergisi
The information in bank web sites, which are broadly assumed in numerous nations, must be accessible for all people, easy to use, exact and secure. ...
In this way, websites and mobile applications should be usable, accessible, well coded, secured and mobile-device ready. ...
Great effort is needed for bank web sites in the Turkey to improve accessibility, usability and security. ...
doi:10.20491/isarder.2018.396
fatcat:qvo2yp7r55e4jhwrfatuyng24e
In the study, it significantly decreased the spoof rate of typical phishing attacks from 63% to 7%, and it effectively prevented all phishing attacks as long as it was used. ...
It integrates security questions into the user's workflow so that its protection cannot be ignored by the user. ...
This work was supported in part by the National Science Foundation (award number IIS-0447800). ...
doi:10.1145/1143120.1143133
dblp:conf/soups/WuML06
fatcat:ujn6dlhvdvahrhi65p7pbwromm
Crowdsourcing Attacks on Biometric Systems
2014
Symposium On Usable Privacy and Security
We discuss implications of our results for the security analysis of SV systems (and of biometric systems, in general) and highlight benefits and challenges associated with the use of crowdsourcing in such ...
threat to real systems. ...
and banks elsewhere in the world are also moving in that direction [25] 4 . ...
dblp:conf/soups/PanjwaniP14
fatcat:dh7krevjrbahzf2yjmruphohpe
User Perceptions of Sharing, Advertising, and Tracking
2015
Symposium On Usable Privacy and Security
We presented results of 368 participant responses across four types of websites -an online banking site, an online shopping site, a search engine and a social networking site. ...
In general, we identified that participants had positive responses for OBA and that they demonstrated clear preferences for which classes of information they would like to disclose online. ...
Symposium on Usable Privacy and Security (SOUPS) 2015, July 22-24, 2015, Ottawa, Canada. Leon et al. ...
dblp:conf/soups/ChancharyC15
fatcat:lsfvk2frgnhcdbn6hticac43uy
Usability and Security of Text Passwords on Mobile Devices
2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16
We compare the strength and usability of passwords created and used on mobile devices with those created and used on desktops and laptops, while varying password policy requirements and input methods. ...
However, this research has generally been in the context of desktops and laptops, while users are increasingly creating and entering passwords on mobile devices. ...
This research was supported in part by NSF grants DGE-0903659 and CNS-1116776 and gifts from the PNC Center for Financial Services Innovation and Microsoft Research. ...
doi:10.1145/2858036.2858384
dblp:conf/chi/MelicherKSKSUBC16
fatcat:5kmmsdwzingolh7e7433ujobi4
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
2011
Computers & security
of a real-world automated telephone banking service. ...
Online banking fraud, on the other hand, rose by 55% in the same period (presumably in part as a consequence of the Chip and PIN initiative). ...
doi:10.1016/j.cose.2010.12.001
fatcat:jnmjisgolnhtvkie7vr57xwwo4
Skills and Characteristics of Successful Cybersecurity Advocates
2017
Symposium On Usable Privacy and Security
Cybersecurity advocates attempt to counter the tsunami of cyber attacks by promoting security best practices and encouraging security technology adoption. ...
Additionally, the cybersecurity profession neglects to frame the field as service-oriented, a theme identified repeatedly in our interviews. ...
Cybersecurity Advocate Education Advocates tend to be more advanced in their careers, having built on prior real-world experience. ...
dblp:conf/soups/HaneyL17
fatcat:hsjsvkgeofbjnnrglof4nbmqim
User, Usage and Usability: Redefining Human Centric Cyber Security
2021
Frontiers in Big Data
In this paper, we survey advancements made in the development and design of the human centric cyber security domain. ...
We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U's) as three essential components for cyber security consideration, and classify developmental ...
Furthermore, organizations to a large extent follow a tick the box approach, with no real consideration for the real intention in terms of cyber security. ...
doi:10.3389/fdata.2021.583723
pmid:33748750
pmcid:PMC7968726
fatcat:y4aztmzsfjbzpfpiroomhmuhjm
Folk models of home computer security
2010
Proceedings of the Sixth Symposium on Usable Privacy and Security - SOUPS '10
The rise of botnets has amplified this problem; attackers compromise these computers, aggregate them, and use the resulting network to attack third parties. ...
Finally, I describe one reason why botnets are so difficult to eliminate: they cleverly take advantage of gaps in these models so that many home computer users do not take steps to protect against them ...
Folk models are mental models that are not necessarily accurate in the real world, thus leading to erroneous decision making, but are shared among similar members of a culture [11] . ...
doi:10.1145/1837110.1837125
dblp:conf/soups/Wash10
fatcat:6rnvhr6vkncwlnlripmqi5fbdi
"My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security
2015
Symposium On Usable Privacy and Security
Despite these differences, we did not find a direct relationship between people's technical background and the actions they took to control their privacy or increase their security online. ...
We undertook a qualitative study to understand what people do and do not know about the Internet and how that knowledge affects their responses to privacy and security risks. ...
the XIA project for their feedback and suggestions. ...
dblp:conf/soups/KangDFK15
fatcat:77irzhzvmnghfba34ejnetoywa
« Previous
Showing results 1 — 15 out of 12,189 results