Filters








4,605 Hits in 16.7 sec

On the importance of ecologically valid usable security research for end users and IT workers [article]

Sascha Fahl, University, My
2019
This work illustrated the importance of basing usable security and privacy research results on ecologically valid study methodologies.  ...  Conclusions Throughout this thesis, I demonstrated the importance of usable security and privacy research for four important actors in IT security ecosystems: End users, administrators, developers and  ...  Choose one answer: Never, Once, Twice, Three times, More than three times, n/a, I don't know, Other. How important is it to you that only you and the recipient can read private messages?  ... 
doi:10.15488/8668 fatcat:7oh5c5uplrdbdhwnejmhnfo5fi

Considering human factors in BCI experiments: a global approach

Claudine Botte-Lecocq, Marie-Héléne Bekaert, Jean-Marc Vannobel, Stéphanie Leclerc, François Cabestaing
2014 Journal Europeen des Systemes Automatises  
To insure the ecological validity of such systems, it is essential to follow a user-centred design method involving the final user early in the design, and to experiment and evaluate BCIs with disabled  ...  The interface usability is defined in the literature according to its efficiency of use, the user subjective satisfaction, its easiness of learning or remembering and its error rate.  ... 
doi:10.3166/jesa.48.283-301 fatcat:llekus6kwvhnpg7hlouwoyhm64

Graphical passwords

Robert Biddle, Sonia Chiasson, P.C. Van Oorschot
2012 ACM Computing Surveys  
We provide a comprehensive overview of published research in the area, covering both usability and security aspects, as well as system evaluation.  ...  The paper first catalogues existing approaches, highlighting novel features of selected schemes and identifying key usability or security advantages.  ...  The first and third authors acknowledge Discovery Grants through the Natural Sciences and Engineering Research Council of Canada (NSERC).  ... 
doi:10.1145/2333112.2333114 fatcat:4kdrwtfffvdkrjxcodefwr3awi

D5.3 - End User Validation

Christian Löw, Albert Rafetseder, Svenja Schröder, Aleksandar Antonić, Luca De Santis, Gerhard Duennebeil, Mario Drobics, Karl Kreiner, Kurt Edegger, Reinhard Herzog, Michael Jacoby, Adam Olszewski (+1 others)
2018 Zenodo  
This deliverable reports on the findings of the end user validation activities, based on symbIoTe's five use cases and their respective developments and prototypical implementations.  ...  Based on this, T5.3 living labs and usability studies in symbIoTe focus on the very final evaluation stage of service co-development, namely end user validation.  ...  Key goals of the validation were confirming:  The usability and responsiveness of end-user smartphone applications on iOS and Android platform, comparison of precision between iOS and Android.  ... 
doi:10.5281/zenodo.1571402 fatcat:c7ila5igmfgybmildxfygavnxe

Heuristics for Evaluating IT Security Management Tools

Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov
2013 Zenodo  
, and the participants' opinion about the use of heuristics for evaluation of IT security tools.  ...  We then discuss the implications of our results on the use of ITSM and Nielsen's heuristics for usability evaluation of ITSM tools.  ...  PN8 also indicated that many of the problems that might be important for end-users, might not be as important for security admins who will be trained to use the tool.  ... 
doi:10.5281/zenodo.3264657 fatcat:md656cspkzhe7ehy53rlrmn44a

Usability of Humanly Computable Passwords [article]

Samira Samadi, Santosh Vempala, Adam Tauman Kalai
2018 arXiv   pre-print
Thus far, the security and efficiency of these "mental algorithms" has been analyzed only theoretically. But are such methods usable?  ...  We present the first usability study of humanly computable password strategies, involving a learning phase (to learn a password strategy), then a rehearsal phase (to login to a few websites), and multiple  ...  We would like to thank Manuel Blum, Vivek Sarkar, and Rosa Arriaga for helpful discussions on the topics of this paper.  ... 
arXiv:1712.03650v2 fatcat:vdxeyznlvfhxxb2p3xfkxbxkxm

Ecological Validity of Virtual Reality: Three Use Cases [chapter]

Alexis Paljic
2017 Lecture Notes in Computer Science  
These works are chosen as a basis for the discussion because they are all designed to assess validity using one method : the comparison of user perception and behavior between real and virtual environements  ...  This paper is a discussion on the question of ecological validity of virtual reality in the light of three studies that we have done in previous works.  ...  The research field of ecological validity in VR is very large since sensorimotor and cognitive resources are different for each activity, and may be even so between different users.  ... 
doi:10.1007/978-3-319-70742-6_28 fatcat:hytirhv7z5bwzgu3fnrp3khepq

Heuristics for evaluating IT security management tools

Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov
2011 Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11  
, and the participants' opinion about the use of heuristics for evaluation of IT security tools.  ...  The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive.  ...  PN8 also indicated that many of the problems that might be important for end-users, might not be as important for security admins who will be trained to use the tool.  ... 
doi:10.1145/2078827.2078837 dblp:conf/soups/JaferianHSVB11 fatcat:hjyamgx52jhzddvxxtie2x7ngu

Heuristics for evaluating IT security management tools

Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Konstantin Beznosov
2011 Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA '11  
, and the participants' opinion about the use of heuristics for evaluation of IT security tools.  ...  The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive.  ...  PN8 also indicated that many of the problems that might be important for end-users, might not be as important for security admins who will be trained to use the tool.  ... 
doi:10.1145/1979742.1979820 dblp:conf/chi/JaferianHSB11 fatcat:g6s6imipjnfmvkxtmps2vrcjue

Heuristics for Evaluating IT Security Management Tools

Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov
2014 Human-Computer Interaction  
, and the participants' opinion about the use of heuristics for evaluation of IT security tools.  ...  The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive.  ...  PN8 also indicated that many of the problems that might be important for end-users, might not be as important for security admins who will be trained to use the tool.  ... 
doi:10.1080/07370024.2013.819198 fatcat:a35iplnbnjcbjiwadss6wns47a

Designing Internet-Based Payment Systems: Guidelines and Empirical Basis

Dennis Abrazhevich, Panos Markopoulos, Matthias Rauterberg
2009 Human-Computer Interaction  
a high degree of ecological validity.  ...  This could lead to the development of validated instruments for predicting the user acceptance of EPSs, encompassing concerns such as privacy, trust, security, and usability.  ...  ceived October 22, 2007 , July 10, 2008 , and November 12, 2008 . Accepted by Richard Pew. Final manuscript received December 2, 2008.-Editor.  ... 
doi:10.1080/07370020903038144 fatcat:n2mbjwutmfb7blhszj6kazocpi

Designing Password Policies for Strength and Usability

Richard Shay, Lorrie Faith Cranor, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin
2016 ACM Transactions on Privacy and Security  
These policies restrict the space of user-created passwords to preclude easily guessed passwords and thus make passwords more difficult for attackers to guess.  ...  Password-composition policies are the result of service providers becoming increasingly concerned about the security of online accounts.  ...  Researchers from another university similarly studied the ecological validity of research studies about passwords.  ... 
doi:10.1145/2891411 fatcat:lumogvmkkvbarmn2zqfyhwcppm

User-centered design of identity and access management systems

Pooya Jaferian
2014 Zenodo  
IT security management (ITSM) technologies are important components of IT security in organizations.  ...  In the first phase, we developed a set of usability guidelines, and heuristics for design and usability evaluation of ITSM tools.  ...  PN8 also indicated that many of the problems that might be important for end-users, might not be as important for security admins who will be trained to use the tool. !"#$ !"  ... 
doi:10.5281/zenodo.3264685 fatcat:ooakant2ffaizdyqpsw4xlhtuq

User Studies of a Sketch-Based Collaborative Distant Design Solution in Industrial Context [chapter]

Stéphane Safin, Pierre Leclercq
2009 Lecture Notes in Computer Science  
The paper relates the concepts of the sketch-based collaboration, describes the Distant Collaborative Design Studio and proposes a methodology to assess the utility and usability of the system in two different  ...  The results and conclusions show the issues linked to the implementation of such sketch-based collaborative environment in professional contexts.  ...  On a global pointy of view, it has been noted that the real-time collaboration allowed by the system leads to an enhancement of participation and a time profit for generating and validating ideas.  ... 
doi:10.1007/978-3-642-04265-2_16 fatcat:qkdhfaw47ngyvdmsr6lnbe7rsq

The "Worktivity" mHealth intervention to reduce sedentary behaviour in the workplace: a feasibility cluster randomised controlled pilot study

Aoife Stephenson, Matias Garcia-Constantino, Marie H. Murphy, Suzanne M. McDonough, Chris D. Nugent, Jacqueline L. Mair
2021 BMC Public Health  
The aim of this paper is to report the feasibility of delivering the Worktivity intervention to desk-based office workers in the workplace setting and describe methodological considerations for a future  ...  Office workers' engagement with the app was moderate (on average 59%).  ...  The authors declare that they have no other competing interests.  ... 
doi:10.1186/s12889-021-11473-6 pmid:34275463 pmcid:PMC8286585 fatcat:xfgxpgw3vvgc3blgvqslnmbf7u
« Previous Showing results 1 — 15 out of 4,605 results