Author: Harold Thimbleby
Publisher: Springer Science & Business Media
ISBN: 1447136012
Category : Computers
Languages : en
Pages : 419
Book Description
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
People and Computers XII
Author: Harold Thimbleby
Publisher: Springer Science & Business Media
ISBN: 1447136012
Category : Computers
Languages : en
Pages : 419
Book Description
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
Publisher: Springer Science & Business Media
ISBN: 1447136012
Category : Computers
Languages : en
Pages : 419
Book Description
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
XII Mediterranean Conference on Medical and Biological Engineering and Computing 2010
Author: Nicolas Pallikarakis
Publisher: Springer Science & Business Media
ISBN: 3642130399
Category : Technology & Engineering
Languages : en
Pages : 1070
Book Description
Over the past three decades, the exploding number of new technologies and applications introduced in medical practice, often powered by advances in biosignal processing and biomedical imaging, created an amazing account of new possibilities for diagnosis and therapy, but also raised major questions of appropriateness and safety. The accelerated development in this field, alongside with the promotion of electronic health care solutions, is often on the basis of an uncontrolled diffusion and use of medical technology. The emergence and use of medical devices is multiplied rapidly and today there exist more than one million different products available on the world market. Despite the fact that the rising cost of health care, partly resulting from the new emerging technological applications, forms the most serious and urgent problem for many governments today, another important concern is that of patient safety and user protection, issues that should never be compromised and expelled from the Biomedical Engineering research practice agenda.
Publisher: Springer Science & Business Media
ISBN: 3642130399
Category : Technology & Engineering
Languages : en
Pages : 1070
Book Description
Over the past three decades, the exploding number of new technologies and applications introduced in medical practice, often powered by advances in biosignal processing and biomedical imaging, created an amazing account of new possibilities for diagnosis and therapy, but also raised major questions of appropriateness and safety. The accelerated development in this field, alongside with the promotion of electronic health care solutions, is often on the basis of an uncontrolled diffusion and use of medical technology. The emergence and use of medical devices is multiplied rapidly and today there exist more than one million different products available on the world market. Despite the fact that the rising cost of health care, partly resulting from the new emerging technological applications, forms the most serious and urgent problem for many governments today, another important concern is that of patient safety and user protection, issues that should never be compromised and expelled from the Biomedical Engineering research practice agenda.
Human-Computer Interaction
Author: Andrew Sears
Publisher: CRC Press
ISBN: 1420088866
Category : Computers
Languages : en
Pages : 384
Book Description
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking resource, Human-Computer Interaction: Design Issues, Solutions, and Applications focuses on HCI from a pri
Publisher: CRC Press
ISBN: 1420088866
Category : Computers
Languages : en
Pages : 384
Book Description
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking resource, Human-Computer Interaction: Design Issues, Solutions, and Applications focuses on HCI from a pri
Handbook of Research on User Interface Design and Evaluation for Mobile Technology
Author: Lumsden, Joanna
Publisher: IGI Global
ISBN: 1599048728
Category : Computers
Languages : en
Pages : 1166
Book Description
"This book compiles authoritative research from scholars worldwide, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace"--Provided by publisher.
Publisher: IGI Global
ISBN: 1599048728
Category : Computers
Languages : en
Pages : 1166
Book Description
"This book compiles authoritative research from scholars worldwide, covering the issues surrounding the influx of information technology to the office environment, from choice and effective use of technologies to necessary participants in the virtual workplace"--Provided by publisher.
Interactive Systems. Design, Specification, and Verification
Author: Gavin Doherty
Publisher: Springer
ISBN: 3540695540
Category : Computers
Languages : en
Pages : 280
Book Description
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Design, Specification, and Verification of Interactive Systems, DSVIS 2006, held in Dublin, Ireland in July 2006. The 19 revised full papers presented together with one keynote paper, and two working group reports were carefully reviewed and selected from 57 submissions during two rounds of reviewing and improvement.
Publisher: Springer
ISBN: 3540695540
Category : Computers
Languages : en
Pages : 280
Book Description
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Design, Specification, and Verification of Interactive Systems, DSVIS 2006, held in Dublin, Ireland in July 2006. The 19 revised full papers presented together with one keynote paper, and two working group reports were carefully reviewed and selected from 57 submissions during two rounds of reviewing and improvement.
Encyclopedia of Human Computer Interaction
Author: Ghaoui, Claude
Publisher: IGI Global
ISBN: 1591407982
Category : Computers
Languages : en
Pages : 780
Book Description
Esta enciclopedia presenta numerosas experiencias y discernimientos de profesionales de todo el mundo sobre discusiones y perspectivas de la la interacción hombre-computadoras
Publisher: IGI Global
ISBN: 1591407982
Category : Computers
Languages : en
Pages : 780
Book Description
Esta enciclopedia presenta numerosas experiencias y discernimientos de profesionales de todo el mundo sobre discusiones y perspectivas de la la interacción hombre-computadoras
Assistive Technology on the Threshold of the New Millennium
Author: Christian Bühler
Publisher: IOS Press
ISBN: 9781586030018
Category : Education
Languages : en
Pages : 862
Book Description
The field of assistive technology is influenced by the ongoing and rapid development of mainstream technologies on the one hand and continuing changes to social systems in relation to societal events - such as the ageing of the population - on the other. The articles in this book provide a broad overview of developments in technical support for people with functional restrictions: key technologies like telecommunications and IT are addressed, while low-tech practical solutions are also considered.
Publisher: IOS Press
ISBN: 9781586030018
Category : Education
Languages : en
Pages : 862
Book Description
The field of assistive technology is influenced by the ongoing and rapid development of mainstream technologies on the one hand and continuing changes to social systems in relation to societal events - such as the ageing of the population - on the other. The articles in this book provide a broad overview of developments in technical support for people with functional restrictions: key technologies like telecommunications and IT are addressed, while low-tech practical solutions are also considered.
Intelligent Distributed Computing XII
Author: Javier Del Ser
Publisher: Springer
ISBN: 3319996266
Category : Technology & Engineering
Languages : en
Pages : 451
Book Description
This book gathers a wealth of research contributions on recent advances in intelligent and distributed computing, and which present both architectural and algorithmic findings in these fields. A major focus is placed on new techniques and applications for evolutionary computation, swarm intelligence, multi-agent systems, multi-criteria optimization and Deep/Shallow machine learning models, all of which are approached as technological drivers to enable autonomous reasoning and decision-making in complex distributed environments. Part of the book is also devoted to new scheduling and resource allocation methods for distributed computing systems. The book represents the peer-reviewed proceedings of the 12th International Symposium on Intelligent Distributed Computing (IDC 2018), which was held in Bilbao, Spain, from October 15 to 17, 2018.
Publisher: Springer
ISBN: 3319996266
Category : Technology & Engineering
Languages : en
Pages : 451
Book Description
This book gathers a wealth of research contributions on recent advances in intelligent and distributed computing, and which present both architectural and algorithmic findings in these fields. A major focus is placed on new techniques and applications for evolutionary computation, swarm intelligence, multi-agent systems, multi-criteria optimization and Deep/Shallow machine learning models, all of which are approached as technological drivers to enable autonomous reasoning and decision-making in complex distributed environments. Part of the book is also devoted to new scheduling and resource allocation methods for distributed computing systems. The book represents the peer-reviewed proceedings of the 12th International Symposium on Intelligent Distributed Computing (IDC 2018), which was held in Bilbao, Spain, from October 15 to 17, 2018.
Human-computer Interaction
Author: Michitaka Hirose
Publisher: IOS Press
ISBN: 9781586031886
Category : Computers
Languages : en
Pages : 1312
Book Description
This book covers the proceedings of INTERACT 2001 held in Tokyo, Japan, July 2001. The conference covers human-computer interaction and topics presented include: interaction design, usability, novel interface devices, computer supported co-operative works, visualization, and virtual reality. The papers presented in this book should appeal to students and professionals who wish to understand multimedia technologies and human-computer interaction.
Publisher: IOS Press
ISBN: 9781586031886
Category : Computers
Languages : en
Pages : 1312
Book Description
This book covers the proceedings of INTERACT 2001 held in Tokyo, Japan, July 2001. The conference covers human-computer interaction and topics presented include: interaction design, usability, novel interface devices, computer supported co-operative works, visualization, and virtual reality. The papers presented in this book should appeal to students and professionals who wish to understand multimedia technologies and human-computer interaction.
Second International Conference on Computer Networks and Communication Technologies
Author: S. Smys
Publisher: Springer Nature
ISBN: 3030370518
Category : Technology & Engineering
Languages : en
Pages : 981
Book Description
This book presents new communication and networking technologies, an area that has gained significant research attention from both academia and industry in recent years. It also discusses the development of more intelligent and efficient communication technologies, which are an essential part of current day-to-day life, and reports on recent innovations in technologies, architectures, and standards relating to these technologies. The book includes research that spans a wide range of communication and networking technologies, including wireless sensor networks, big data, Internet of Things, optical and telecommunication networks, artificial intelligence, cryptography, next-generation networks, cloud computing, and natural language processing. Moreover, it focuses on novel solutions in the context of communication and networking challenges, such as optimization algorithms, network interoperability, scalable network clustering, multicasting and fault-tolerant techniques, network authentication mechanisms, and predictive analytics.
Publisher: Springer Nature
ISBN: 3030370518
Category : Technology & Engineering
Languages : en
Pages : 981
Book Description
This book presents new communication and networking technologies, an area that has gained significant research attention from both academia and industry in recent years. It also discusses the development of more intelligent and efficient communication technologies, which are an essential part of current day-to-day life, and reports on recent innovations in technologies, architectures, and standards relating to these technologies. The book includes research that spans a wide range of communication and networking technologies, including wireless sensor networks, big data, Internet of Things, optical and telecommunication networks, artificial intelligence, cryptography, next-generation networks, cloud computing, and natural language processing. Moreover, it focuses on novel solutions in the context of communication and networking challenges, such as optimization algorithms, network interoperability, scalable network clustering, multicasting and fault-tolerant techniques, network authentication mechanisms, and predictive analytics.