Zobrazeno 1 - 10
of 653
pro vyhledávání: '"Human-computer interaction in information security"'
Autor:
Justin Joque, S. M. Taiabul Haque
Publikováno v:
NSPW
This paper examines the philosophical aspects of cybersecurity through the lens of deconstruction, as proposed by the French philosopher Jacques Derrida. We offer deconstruction as an analytical orientation to better understand and challenge the very
Publikováno v:
Future Generation Computer Systems. 82:769-782
In the Internet of Things (IoT) era, a variety of devices that accumulate a range of data and electronic information are connected to the internet. This information is intelligently processed to create new services. As a result, the range of security
Publikováno v:
Computers & Security. 73:266-293
The popularity of smartphones, coupled with the amount of valuable and private information they hold, make them attractive to attackers interested in exploiting the devices to harvest sensitive information. Exploiting human vulnerabilities (i.e., soc
Autor:
Sonya Zhang, Saree Costa
Publikováno v:
International Journal of Mobile Human Computer Interaction. 10:23-39
As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mob
Publikováno v:
Computer Science Review. 26:1-16
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usabil
Publikováno v:
Computers & Security. 70:723-743
The emergence of the cloud computing paradigm has altered the delivery models for ICT services. Unfortunately, the widespread use of the cloud has a cost, in terms of reduced transparency and control over a user's information and services. In additio
Publikováno v:
Computers & Security. 70:376-391
Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users a
Autor:
Tanya McGill, Nik Thompson
Publikováno v:
Behaviour & Information Technology. 36:1111-1124
Home users are particularly vulnerable to information security threats as they must make decisions about how to protect themselves, often with little knowledge of the technology. Furthermore, information for home users tends to focus on the tradition
Publikováno v:
Information & Computer Security. 25:190-205
Purpose The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized, external
Publikováno v:
IEEE Internet Computing. 21:30-38
End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services.