Zobrazeno 1 - 10
of 1 654
pro vyhledávání: '"L., Jean"'
Publikováno v:
Journal of Services Marketing, 2024, Vol. 38, Issue 5, pp. 636-655.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JSM-07-2023-0261
Autor:
Mankoff, Jennifer, Kasnitz, Devva, Studies, Disability, Camp, L Jean, Lazar, Jonathan, Hochheiser, Harry
This response to the RFI considers the potential for biometrics to help or harm disabled people2. Biometrics are already integrated into many aspects of daily life, from airport travel to mobile phone use. Yet many of these systems are not accessible
Externí odkaz:
http://arxiv.org/abs/2208.04712
Publikováno v:
In International Symposium on Human Aspects of Information Security and Assurance (pp. 127-137). Springer, Cham (2021)
Secure installation of Internet of Things (IoT) devices requires configuring access control correctly for each device. In order to enable correct configuration the Manufacturer Usage Description (MUD) has been developed by Internet Engineering Task F
Externí odkaz:
http://arxiv.org/abs/2112.02412
Manufacturer Usage Description (MUD) is an Internet Engineering Task Force (IETF) standard designed to protect IoT devices and networks by creating an out-of-the-box access control list for an IoT device. %The protocol defines a conceptually straight
Externí odkaz:
http://arxiv.org/abs/2107.06372
Autor:
Das, Sanchari, Gutzwiller, Robert S., Roscoe, Rod D., Rajivan, Prashanth, Wang, Yang, Camp, L. Jean, Hoyle, Roberto
Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from malicious th
Externí odkaz:
http://arxiv.org/abs/2101.07377
Publikováno v:
Communications of the ACM; Dec2024, Vol. 67 Issue 12, p40-42, 3p
Spear phishing is a deceptive attack that uses social engineering to obtain confidential information through targeted victimization. It is distinguished by its use of social cues and personalized information to target specific victims. Previous work
Externí odkaz:
http://arxiv.org/abs/2006.16380
In the age of ubiquitous technologies, security- and privacy-focused choices have turned out to be a significant concern for individuals and organizations. Risks of such pervasive technologies are extensive and often misaligned with user risk percept
Externí odkaz:
http://arxiv.org/abs/2006.09531