Sökning: "Usable Security"

Visar resultat 1 - 5 av 18 avhandlingar innehållade orden Usable Security.

  1. 1. Usable Firewall Rule Sets

    Författare :Artem Voronkov; Stefan Lindskog; Kami Vaniea; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Network Security; Usable Security; Firewall Configuration; Systematic Literature Review; Usability Metrics; User Studies; Computer Science; Datavetenskap;

    Sammanfattning : Correct functioning is the most important requirement for any system. Nowadays there are a lot of threats to computer systems that undermine confidence in them and, as a result, force a user to abandon their use. Hence, a system cannot be trusted if there is no proper security provided. LÄS MER

  2. 2. Usable privacy for digital transactions : Exploring the usability aspects of three privacy enhancing mechanisms

    Författare :Julio Angulo; John Sören Pettersson; Simone Fischer-Hübner; Erik Wästlund; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Privacy-Enhancing Technologies; usability; usable privacy; mental models; mobile devices; security; digital transactions; e-commerce; User Interfaces; Information Systems; Informatik;

    Sammanfattning : The amount of personal identifiable information that people distribute over different online services has grown rapidly and considerably over the last decades. This has led to increased probabilities for identity theft, profiling and linkability attacks, which can in turn not only result in a threat to people’s personal dignity, finances, and many other aspects of their lives, but also to societies in general. LÄS MER

  3. 3. Usable Security Policies for Runtime Environments

    Författare :Almut Herzog; Nahid Shahmehri; Steven Furnell; Linköpings universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Information security; Usability; Java; Resource control; Virtual machine; Computer science; Datavetenskap;

    Sammanfattning : The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because the applications can be deployed on any platform that supports the target virtual machine. LÄS MER

  4. 4. Designing for Usable Privacy and Transparency in Digital Transactions

    Författare :Julio Angulo; John Sören Pettersson; Simone Fischer-Hübner; Erik Wästlund; Joachim Meyer; Karlstads universitet; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; SAMHÄLLSVETENSKAP; SOCIAL SCIENCES; Usable privacy; usable transparency; usability; user experience; mental models; mobile devices; digital transactions; e-commerce; user interfaces; Information Systems; Informatik; Computer Science; Datavetenskap;

    Sammanfattning : People engage with multiple online services and carry out a range of different digital transactions with these services. Registering an account, sharing content in social networks, or requesting products or services online are a few examples of such digital transactions. LÄS MER

  5. 5. Context-Based Micro-Training : Enhancing cybersecurity training for end-users

    Författare :Joakim Kävrestad; Marcus Nohlberg; Steven Furnell; Rose-Mharie Åhlfeldt; Lothar Fritsch; Högskolan i Skövde; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; cybersecurity; training; usable; security; user; education; awareness; Information Systems; Informationssystem IS ;

    Sammanfattning : This research addresses the human aspect of cybersecurity by developing a method for cybersecurity training of end-users. The reason for addressing that area is that human behaviour is widely regarded as one of the most used attack vectors. LÄS MER