Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Tara Whalen"'
Autor:
Xinru Page, Jen King, Pamela Wisniewski, Airi Lampinen, Luke Stark, Tara Whalen, Jessica Vitak, Nathaniel Good
Publikováno v:
CHI Extended Abstracts
While there has been considerable academic work over the past decade on preserving and enhancing digital privacy, little of this scholarship has influenced practitioners in design or industry. By bringing together leading privacy academics and commer
Publikováno v:
IEEE Transactions on Information Forensics and Security. 6:970-979
Despite all efforts, password schemes intended to deploy or encourage the use of strong passwords have largely failed. As an alternative to enable users to create, maintain, and use high-quality passwords willingly, we propose Object-based Password (
Autor:
Tara Whalen
Publikováno v:
IEEE Security & Privacy Magazine. 9:64-67
Computer security and usability are challenging problems that are often interrelated. In harmonizing security and usability, it isn't enough to consider how human factors can be leveraged in support of security. Instead, it's important to take a user
Autor:
Tara Whalen, Carrie Gates
Publikováno v:
Information Management & Computer Security. 18:14-25
PurposeWhile many papers discuss the privacy implications of workplace monitoring, the purpose of this paper is to describe the positive aspects to voluntary monitoring in the workplace.Design/methodology/approachThese aspects were identified through
Publikováno v:
CCSW
There has been a loss of confidence in the security provided by SSL certificates and browser interfaces in the face of various attacks. As one response, basic SSL server certificates are being demoted to second-class status in conjunction with the in
Publikováno v:
CHIMIT
Within the workplace setting, people need to provide sufficient access to files to allow collaboration, without inadvertently exposing sensitive files. Evidence suggests that file sharing problems exist, and decrease security and interfere with colla
Autor:
Tara Whalen, Carrie Gates
Publikováno v:
Journal of Computers. 2
The security community has used psychological research on attacker personalities, but little work has been done to investigate the personalities of the defenders. One instrument currently dominating personality research is the Five Factor Model, a ta
Publikováno v:
CHI Extended Abstracts
The sharing of network-based information is a key component of recreational and professional interaction, from email attachments to P2P networks. However, people need to accommodate technical challenges in successful and secure content sharing. In pa
Publikováno v:
Tabletop
This paper explores users' interpersonal interactions during collaboration around a tabletop display, in order to better understand the affordances offered by this medium. We investigate participants' collaborative interactions, particularly related
Autor:
Tara Whalen, Carrie Gates
Publikováno v:
Intelligence and Security Informatics ISBN: 9783540333616
WISI
WISI
The security community has used psychological research on attacker personalities, but little work has been done to investigate the personalities of the defenders. We surveyed 43 security professionals using a Five Factor Model-based test to reveal co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8d18d69a08fed3612b493df87e191406
https://doi.org/10.1007/11734628_11
https://doi.org/10.1007/11734628_11