EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Cross cultural Effects on Recognition based Graphical Password Usability and Design

Download or read book Cross cultural Effects on Recognition based Graphical Password Usability and Design written by Mona A. Mohamed and published by . This book was released on 2019 with total page 265 pages. Available in PDF, EPUB and Kindle. Book excerpt: The purpose of this research is to examine the effects of Chinese and Saudi cultural dimensions on the cross-cultural design and user's preferences or behavioral intention towards Recognition-Based Graphical Password (RBG-P) interface. This may contribute to the solution of the conflict that results from designing an interface in one culture and its usage in different cultures. Three hypotheses have been tested in a four-week long study that has been carried out using RBG-P webtool and two surveys on 25 Chinese and 25 Saudi participants. Participants are provided with three sets of 90 images that correspond to Chinese, Saudi and Neutral cultural spaces to select their 5 images to form their RBG-P. The first two hypotheses investigate the cultural effects on the selection and memorization of sequenced RBG-P images. While the third hypothesis tests the participants satisfaction, the acceptability and the adoption of RBG-P. The study offers suggestive evidence that the images selection by the participant for RBG-P creation are largely influenced by the participant's culture. In other words, Chinese and Saudi cultures value usability criteria differently. This effect of culture extends to the sequence of the images to form the RBG-P. In addition, the participants are similarly discriminatory not only to their own culture, but equally to their behavior towards other cultures. Therefore, cross culturally designs may have significant effects on the acceptability and adoption of the interface to multi cultural settings. These differences may lead to better development of culturally adaptive interfaces. The investigation on culture and the three-experiment phase show that culture has clear effects on the memorization of the password, which includes both recognition and recalling of the images and their sequence, respectively. In addition, when participants select from their own culture they experience lower failure rates and vice versa. It is noticeable that the success rate of login depreciates quickly with the progress of the phases, which suggest the possibility of memory decay due to the time effects.

Book Universal Access in Human Computer Interaction  Novel Design Approaches and Technologies

Download or read book Universal Access in Human Computer Interaction Novel Design Approaches and Technologies written by Margherita Antona and published by Springer Nature. This book was released on 2022-06-16 with total page 577 pages. Available in PDF, EPUB and Kindle. Book excerpt: This two-volume set constitutes the refereed proceedings of the 16th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2022, held as part of the 24th International Conference, HCI International 2022, held as a virtual event, in June-July 2022. A total of 1271 papers and 275 posters included in the 39 HCII 2022 proceedings volumes. UAHCI 2022 includes a total of 73 papers; they focus on topics related to universal access methods, techniques and practices, studies on accessibility, design for all, usability, UX and technology acceptance, emotion and behavior recognition for universal access, accessible media, access to learning and education, as well universal access to virtual and intelligent assistive environments.

Book Usable  Secure and Deployable Graphical Passwords

Download or read book Usable Secure and Deployable Graphical Passwords written by Paul Dunphy and published by Paul Dunphy. This book was released on 2013-01-10 with total page 189 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Intelligent Human Systems Integration 2019

Download or read book Intelligent Human Systems Integration 2019 written by Waldemar Karwowski and published by Springer. This book was released on 2019-01-05 with total page 936 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents cutting-edge research on innovative human systems integration and human–machine interaction, with an emphasis on artificial intelligence and automation, as well as computational modeling and simulation. It covers a wide range of applications in the area of design, construction and operation of products, systems and services, including lifecycle development and human–technology interaction. The book describes advanced methodologies and tools for evaluating and improving interface usability, new models, and case studies and best practices in virtual, augmented and mixed reality systems, with a special focus on dynamic environments. It also discusses various factors concerning the human user, hardware, and artificial intelligence software. Based on the proceedings of the 2nd International Conference on Intelligent Human Systems Integration (IHSI 2019), held on February 7–10, 2019, in San Diego, California, USA, the book also examines the forces that are currently shaping the nature of computing and cognitive systems, such as the need to reduce hardware costs; the importance of infusing intelligence and automation; the trend toward hardware miniaturization and power reduction; the need for a better assimilation of computation in the environment; and social concerns regarding access to computers and systems for people with special needs. It offers a timely survey and a practice-oriented reference guide for policy- and decision-makers, human factors engineers, systems developers and users alike.

Book Usable Authentication with Recognition based Graphical Passwords

Download or read book Usable Authentication with Recognition based Graphical Passwords written by Martin Mihajlov and published by . This book was released on 2011 with total page 135 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Advances in Information and Communication

Download or read book Advances in Information and Communication written by Kohei Arai and published by Springer Nature. This book was released on with total page 735 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Handbook of Human Factors and Ergonomics

Download or read book Handbook of Human Factors and Ergonomics written by Gavriel Salvendy and published by John Wiley & Sons. This book was released on 2012-03-13 with total page 1754 pages. Available in PDF, EPUB and Kindle. Book excerpt: The fourth edition of the Handbook of Human Factors and Ergonomics has been completely revised and updated. This includes all existing third edition chapters plus new chapters written to cover new areas. These include the following subjects: Managing low-back disorder risk in the workplace Online interactivity Neuroergonomics Office ergonomics Social networking HF&E in motor vehicle transportation User requirements Human factors and ergonomics in aviation Human factors in ambient intelligent environments As with the earlier editions, the main purpose of this handbook is to serve the needs of the human factors and ergonomics researchers, practitioners, and graduate students. Each chapter has a strong theory and scientific base, but is heavily focused on real world applications. As such, a significant number of case studies, examples, figures, and tables are included to aid in the understanding and application of the material covered.

Book Security of Information and Networks

Download or read book Security of Information and Networks written by Atilla Eli and published by Trafford Publishing. This book was released on 2008 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book is a select collection of edited papers from the International Conference on Security of Information and Networks (SIN 2007) on the main theme of Information Assurance, Security, and Public Policy. SIN 2007 was hosted by the Eastern Mediterranean University in Gazimagusa, North Cyprus and co-organized by the Istanbul Technical University, Turkey. While SIN 2007 covered all areas of information and network security, the papers included here focused on the following topics: - cryptology: design and analysis of cryptographic algorithms, hardware and software implementations of cryptographic algorithms, and steganography; - network security: authentication, authorization and access control, privacy, intrusion detection, grid security, and mobile and personal area networks; - IT governance: information security management systems, risk and threat analysis, and information security policies. They represent an interesting mix of innovative academic research and experience reports from practitioners. This is further complemented by a number of invited papers providing excellent overviews: - Elisabeth Oswald, University of Bristol, Bristol, UK: Power Analysis Attack: A Very Brief Introduction; - Marc Joye, Thomson R&D, France: On White-Box Cryptography; - Bart Preneel, Katholieke Universiteit Leuven, Leuven, Belgium: Research Challenges in Cryptology; - Mehmet Ufuk Caglayan, Bogazici University, Turkey: Secure Routing in Ad Hoc Networks and Model Checking. The papers are organized in a logical sequence covering Ciphers; Mobile Agents & Networks; Access Control and Security Assurance; Attacks, Intrusion Detection, and Security Recommendations; and, Security Software, Performance, and Experience.

Book Security and Usability

    Book Details:
  • Author : Lorrie Faith Cranor
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2005-08-25
  • ISBN : 0596553854
  • Pages : 741 pages

Download or read book Security and Usability written by Lorrie Faith Cranor and published by "O'Reilly Media, Inc.". This book was released on 2005-08-25 with total page 741 pages. Available in PDF, EPUB and Kindle. Book excerpt: Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics--groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Book Designing for User Engagment

Download or read book Designing for User Engagment written by Alistair Sutcliffe and published by Springer Nature. This book was released on 2022-05-31 with total page 47 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book explores the design process for user experience and engagement, which expands the traditional concept of usability and utility in design to include aesthetics, fun and excitement. User experience has evolved as a new area of Human Computer Interaction research, motivated by non-work oriented applications such as games, education and emerging interactive Web 2.0. The chapter starts by examining the phenomena of user engagement and experience and setting them in the perspective of cognitive psychology, in particular motivation, emotion and mood. The perspective of aesthetics is expanded towards interaction and engagement to propose design treatments, metaphors, and interactive techniques which can promote user interest, excitement and satisfying experiences. This is followed by reviewing the design process and design treatments which can promote aesthetic perception and engaging interaction. The final part of the chapter provides design guidelines and principles drawn from the interaction and graphical design literature which are cross-referenced to issues in the design process. Examples of designs and design treatments are given to illustrate principles and advice, accompanied by critical reflection. Table of Contents: Introduction / Psychology of User Engagement / UE Design Process / Design Principles and Guidelines / Perspectives and Conclusions

Book Universal Principles of Design  Revised and Updated

Download or read book Universal Principles of Design Revised and Updated written by William Lidwell and published by Rockport Pub. This book was released on 2010 with total page 272 pages. Available in PDF, EPUB and Kindle. Book excerpt: Universal Principles of Design is the first comprehensive, cross-disciplinary encyclopedia of design.

Book End User Privacy in Human Computer Interaction

Download or read book End User Privacy in Human Computer Interaction written by Giovanni Iachello and published by Now Publishers Inc. This book was released on 2007 with total page 147 pages. Available in PDF, EPUB and Kindle. Book excerpt: Surveys the rich and diverse landscape of privacy in HCI and CSCW, describing some of the legal foundations and historical aspects of privacy, sketching out an overview of the body of knowledge with respect to designing, implementing, and evaluating privacy-affecting systems, and charting many directions for future work.

Book Computer Security and the Internet

Download or read book Computer Security and the Internet written by Paul C. van Oorschot and published by Springer Nature. This book was released on 2021-10-13 with total page 446 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.

Book Usable Security

    Book Details:
  • Author : Simson Garfinkel
  • Publisher : Morgan & Claypool Publishers
  • Release : 2014-10-01
  • ISBN : 1627055304
  • Pages : 166 pages

Download or read book Usable Security written by Simson Garfinkel and published by Morgan & Claypool Publishers. This book was released on 2014-10-01 with total page 166 pages. Available in PDF, EPUB and Kindle. Book excerpt: There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research.

Book Supporting Users in Password Authentication with Persuasive Design

Download or read book Supporting Users in Password Authentication with Persuasive Design written by Tobias Seitz and published by Tobias Seitz. This book was released on 2018-08-03 with total page 318 pages. Available in PDF, EPUB and Kindle. Book excerpt: Activities like text-editing, watching movies, or managing personal finances are all accomplished with web-based solutions nowadays. The providers need to ensure security and privacy of user data. To that end, passwords are still the most common authentication method on the web. They are inexpensive and easy to implement. Users are largely accustomed to this kind of authentication but passwords represent a considerable nuisance, because they are tedious to create, remember, and maintain. In many cases, usability issues turn into security problems, because users try to work around the challenges and create easily predictable credentials. Often, they reuse their passwords for many purposes, which aggravates the risk of identity theft. There have been numerous attempts to remove the root of the problem and replace passwords, e.g., through biometrics. However, no other authentication strategy can fully replace them, so passwords will probably stay a go-to authentication method for the foreseeable future. Researchers and practitioners have thus aimed to improve users' situation in various ways. There are two main lines of research on helping users create both usable and secure passwords. On the one hand, password policies have a notable impact on password practices, because they enforce certain characteristics. However, enforcement reduces users' autonomy and often causes frustration if the requirements are poorly communicated or overly complex. On the other hand, user-centered designs have been proposed: Assistance and persuasion are typically more user-friendly but their influence is often limited. In this thesis, we explore potential reasons for the inefficacy of certain persuasion strategies. From the gained knowledge, we derive novel persuasive design elements to support users in password authentication. The exploration of contextual factors in password practices is based on four projects that reveal both psychological aspects and real-world constraints. Here, we investigate how mental models of password strength and password managers can provide important pointers towards the design of persuasive interventions. Moreover, the associations between personality traits and password practices are evaluated in three user studies. A meticulous audit of real-world password policies shows the constraints for selection and reuse practices. Based on the review of context factors, we then extend the design space of persuasive password support with three projects. We first depict the explicit and implicit user needs in password support. Second, we craft and evaluate a choice architecture that illustrates how a phenomenon from marketing psychology can provide new insights into the design of nudging strategies. Third, we tried to empower users to create memorable passwords with emojis. The results show the challenges and potentials of emoji-passwords on different platforms. Finally, the thesis presents a framework for the persuasive design of password support. It aims to structure the required activities during the entire process. This enables researchers and practitioners to craft novel systems that go beyond traditional paradigms, which is illustrated by a design exercise.