Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
The discipline of Human-Computer Interaction has a key role to play in the convergence of computing, information and communications and those working in this field constantly face new challenges as new technologies emerge, adapt and change. HCI7 is the premier European Human-Computer Interaction forum, held in 1997 at the University of the West of England, Bristol. The conference is a major international forum for the people-oriented disciplines of human factors, psychology, ergonomics, sociology and organisational theory, the computer-oriented disciplines of software engineering, systems analysis and project management, and increasingly the arts, graphic design, interactive media and the Internet, and annually brings together researchers and practitioners from both industry and the academic community who are working to improve the effectiveness of the computer as a tool and creative medium.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 5,72 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerEUR 7,64 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
Paperback. Zustand: Very Good. People and Computers Xii: Proceedings Of Hci '97 (Bcs Conference Series): Proceedings of HCI '97 12th This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Bestandsnummer des Verkäufers 7719-9783540761723
Anzahl: 1 verfügbar
Anbieter: Bahamut Media, Reading, Vereinigtes Königreich
Paperback. Zustand: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Bestandsnummer des Verkäufers 6545-9783540761723
Anzahl: 1 verfügbar
Anbieter: Phatpocket Limited, Waltham Abbey, HERTS, Vereinigtes Königreich
Zustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Bestandsnummer des Verkäufers Z1-F-038-01386
Anzahl: 1 verfügbar
Anbieter: Bookmonger.Ltd, HILLSIDE, NJ, USA
Paperback. Zustand: Fine. Bestandsnummer des Verkäufers mon0000424658
Anzahl: 2 verfügbar
Anbieter: Best Price, Torrance, CA, USA
Zustand: New. SUPER FAST SHIPPING. Bestandsnummer des Verkäufers 9783540761723
Anzahl: 2 verfügbar
Anbieter: Lucky's Textbooks, Dallas, TX, USA
Zustand: New. Bestandsnummer des Verkäufers ABLIING23Mar3113020176550
Anzahl: Mehr als 20 verfügbar
Anbieter: California Books, Miami, FL, USA
Zustand: New. Bestandsnummer des Verkäufers I-9783540761723
Anzahl: Mehr als 20 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9783540761723_new
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare,. Bestandsnummer des Verkäufers 4900399
Anzahl: Mehr als 20 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 436 pages. 9.21x6.14x0.99 inches. In Stock. Bestandsnummer des Verkäufers x-3540761721
Anzahl: 2 verfügbar