Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
A. Adams, M.A. Sasse, P. Lunt, Making Passwords Secure and Usable.- O. Bdlter, Strategies for organising email.- S. Brewster, Navigating Telephone-Based Interfaces with Earcons.- D. Caulton, K. Dye, Do Users Always Benefit When User Interfaces Are Consistent?- L. Clark, M.A. Sasse, Conceptual Design Reconsidered - The Case of the Internet Session Directory Tool.- D. Day, P. Mdkirinne-Crofts, Computer Anxiety and the Human Computer Interface.- A. Faro, D. Giordano, Towards a situated action calculus for modelling interactions.- M. Fernstrom, L. Bannon, Explorations in Sonic Browsing.- D. Frohlich, K. Chilton, P. Drew, Remote homeplace communication: what is it like and how might we support it?- M. Jacomi, S. Chatty, P. Palanque, A Making-Movies Metaphor for Structuring Software Components in Highly Interactive Application.- C. Johnson, The Impact of Time and Place on the Operation of Mobile Computing Devices.- C. Johnson, The Impact of Marginal Utility and Time on Distributed Information Retrieval.- P. Jones, Computer-Assisted Remote Control for the User with Motor Impairment.- J. Long, Research and the Design of Human-Computer Interactions or hat Happened to Validation?- L. Love, C. Johnson, Using Diagrams to Support the Analysis of System 'Failure' and Operator 'Error'.- D. Martin, J. Bowers, D. Wastell, The Interactional Affordances of Technology.- D. Ramduny, A. Dix, Why, What, Where, When: Architectures for Cooperative work on the World Wide Web.- M. Rauterberg et al., BUILD-IT: a computer vision-based interaction technique for a planning tool.- Chris Roast, Formally Comparing and Informing Notation Design.- K. Sedighian, M. Westrom, Direct Object Manipulation vs Direct Concept Manipulation.- Y.L. Theng et al., HyperAT: HCI and Web Authoring.- P. Timmer, J. Long, Separating User Knowledge of Domain and Device.- W. Wong et al., Eliciting Information Portrayal Requirements.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 4,59 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-F-038-01386
Quantità: 1 disponibili
Da: Bahamut Media, Reading, Regno Unito
Paperback. Condizione: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Codice articolo 6545-9783540761723
Quantità: 1 disponibili
Da: AwesomeBooks, Wallingford, Regno Unito
Paperback. Condizione: Very Good. People and Computers Xii: Proceedings Of Hci '97 (Bcs Conference Series): Proceedings of HCI '97 12th This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . Codice articolo 7719-9783540761723
Quantità: 1 disponibili
Da: Bookmonger.Ltd, HILLSIDE, NJ, U.S.A.
Paperback. Condizione: Fine. Codice articolo mon0000424658
Quantità: 2 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare,. Codice articolo 4900399
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers 'cracking' user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1. Codice articolo 9783540761723
Quantità: 1 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers 'cracking' user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 436 pp. Englisch. Codice articolo 9783540761723
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783540761723_new
Quantità: Più di 20 disponibili
Da: California Books, Miami, FL, U.S.A.
Condizione: New. Codice articolo I-9783540761723
Quantità: Più di 20 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 436 pages. 9.21x6.14x0.99 inches. In Stock. Codice articolo x-3540761721
Quantità: 2 disponibili