Zobrazeno 1 - 10
of 700
pro vyhledávání: '"Human-computer interaction in information security"'
Autor:
Mariki M. Eloff, Jan H. P. Eloff
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9781475710267
SEC
SEC
The use of computers is becoming increasingly more important in everyday life, not only in the work environment, but also in domestic environments. As computer usage increases, so do the things that can go wrong. The Internet has opened up many new w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a5086eda03cf4ef63bc269e5868b0c7f
https://doi.org/10.1007/978-0-387-35586-3_42
https://doi.org/10.1007/978-0-387-35586-3_42
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Justin Joque, S. M. Taiabul Haque
Publikováno v:
NSPW
This paper examines the philosophical aspects of cybersecurity through the lens of deconstruction, as proposed by the French philosopher Jacques Derrida. We offer deconstruction as an analytical orientation to better understand and challenge the very
Publikováno v:
Future Generation Computer Systems. 82:769-782
In the Internet of Things (IoT) era, a variety of devices that accumulate a range of data and electronic information are connected to the internet. This information is intelligently processed to create new services. As a result, the range of security
Publikováno v:
Computers & Security. 73:266-293
The popularity of smartphones, coupled with the amount of valuable and private information they hold, make them attractive to attackers interested in exploiting the devices to harvest sensitive information. Exploiting human vulnerabilities (i.e., soc
Autor:
Sonya Zhang, Saree Costa
Publikováno v:
International Journal of Mobile Human Computer Interaction. 10:23-39
As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mob
Publikováno v:
Computer Science Review. 26:1-16
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usabil
Publikováno v:
Computers & Security. 70:723-743
The emergence of the cloud computing paradigm has altered the delivery models for ICT services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced transparency and control over a user's information and services. In additio
Publikováno v:
Computers & Security. 70:376-391
Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users a
Autor:
Tanya McGill, Nik Thompson
Publikováno v:
Behaviour & Information Technology. 36:1111-1124
Home users are particularly vulnerable to information security threats as they must make decisions about how to protect themselves, often with little knowledge of the technology. Furthermore, information for home users tends to focus on the tradition