Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security and Usability: Designing Secure Systems That People Can Use

Buy

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer

interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usability groups 34 essays into six parts:
  • Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.

  • Authentication Mechanisms-- techniques for identifying and authenticating computer users.

  • Secure Systems--how system software can deliver or destroy a secure user experience.

  • Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.

  • Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,
    IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.

  • The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

(HTML tags aren't allowed.)

Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...
The Digital Photographer's Software Guide
The Digital Photographer's Software Guide

"The Digital Photographer's Software Guide" is your comprehensive guide to the full range of photographic software and plug-ins available to assist in digital photography editing and output. Written for digital photography enthusiasts of all levels, from the novice to the serious hobbyist, and to accommodate any budget, the book...


Stewarding Sustainability Transformations: An Emerging Theory and Practice of SDG Implementation
Stewarding Sustainability Transformations: An Emerging Theory and Practice of SDG Implementation
In the context of the world’s pressing sustainability challenges this new Report to the Club of Rome presents a novel approach to navigating collaborative change in partnerships between governments, research institutions, corporations and civil society activists. With reference to the 17 Sustainable Development Goals and the Planetary...
Absolute Beginner's Guide to A+ Certification
Absolute Beginner's Guide to A+ Certification

Passing a test is one thing...mastering the field is another, and this book is the first step to mastering the world of PC hardware and operating systems. Mark Edward Soper not only shows you what you need to pass the tests, but also what you need to have an edge on the competition, on exam day and in the workplace. Each chapter...

Elementary Numerical Analysis
Elementary Numerical Analysis

Offering a clear, precise, and accessible presentation, complete with MATLAB programs, this new Third Edition of Elementary Numerical Analysis gives students the support they need to master basic numerical analysis and scientific computing. Now updated and revised, this significant revision features reorganized and rewritten content, as well...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy