Lightening in a bottle: usable and secure
Abstract
References
Index Terms
- Lightening in a bottle: usable and secure
Recommendations
Do Users' Perceptions of Password Security Match Reality?
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsAlthough many users create predictable passwords, the extent to which users realize these passwords are predictable is not well understood. We investigate the relationship between users' perceptions of the strength of specific passwords and their actual ...
What Usable Security Really Means: Trusting and Engaging Users
Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 8533Non-compliance with security mechanisms and processes poses a significant risk to organizational security. Current approaches focus on designing systems that restrict user actions to make them 'secure', or providing user interfaces to make security ...
A method for incorporating usable security into computer security courses
SIGCSE '13: Proceeding of the 44th ACM technical symposium on Computer science educationSince human factor security exploits are on the rise, ensuring Usable Security has become extremely important for the overall security of computer systems. However, traditional undergraduate computer security curriculum focuses heavily on technical ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Conference Chair:
- Michael E. Whitman,
- Program Chair:
- Humayun Zafar
Sponsors
- KSU - CISE: KSU Center for InfoSec Education
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- KSU - CISE
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 140Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in