EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Cross cultural Effects on Recognition based Graphical Password Usability and Design

Download or read book Cross cultural Effects on Recognition based Graphical Password Usability and Design written by Mona A. Mohamed and published by . This book was released on 2019 with total page 265 pages. Available in PDF, EPUB and Kindle. Book excerpt: The purpose of this research is to examine the effects of Chinese and Saudi cultural dimensions on the cross-cultural design and user's preferences or behavioral intention towards Recognition-Based Graphical Password (RBG-P) interface. This may contribute to the solution of the conflict that results from designing an interface in one culture and its usage in different cultures. Three hypotheses have been tested in a four-week long study that has been carried out using RBG-P webtool and two surveys on 25 Chinese and 25 Saudi participants. Participants are provided with three sets of 90 images that correspond to Chinese, Saudi and Neutral cultural spaces to select their 5 images to form their RBG-P. The first two hypotheses investigate the cultural effects on the selection and memorization of sequenced RBG-P images. While the third hypothesis tests the participants satisfaction, the acceptability and the adoption of RBG-P. The study offers suggestive evidence that the images selection by the participant for RBG-P creation are largely influenced by the participant's culture. In other words, Chinese and Saudi cultures value usability criteria differently. This effect of culture extends to the sequence of the images to form the RBG-P. In addition, the participants are similarly discriminatory not only to their own culture, but equally to their behavior towards other cultures. Therefore, cross culturally designs may have significant effects on the acceptability and adoption of the interface to multi cultural settings. These differences may lead to better development of culturally adaptive interfaces. The investigation on culture and the three-experiment phase show that culture has clear effects on the memorization of the password, which includes both recognition and recalling of the images and their sequence, respectively. In addition, when participants select from their own culture they experience lower failure rates and vice versa. It is noticeable that the success rate of login depreciates quickly with the progress of the phases, which suggest the possibility of memory decay due to the time effects.

Book Usable  Secure and Deployable Graphical Passwords

Download or read book Usable Secure and Deployable Graphical Passwords written by Paul Dunphy and published by Paul Dunphy. This book was released on 2013-01-10 with total page 189 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Intelligent Human Systems Integration 2019

Download or read book Intelligent Human Systems Integration 2019 written by Waldemar Karwowski and published by Springer. This book was released on 2019-01-05 with total page 936 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents cutting-edge research on innovative human systems integration and human–machine interaction, with an emphasis on artificial intelligence and automation, as well as computational modeling and simulation. It covers a wide range of applications in the area of design, construction and operation of products, systems and services, including lifecycle development and human–technology interaction. The book describes advanced methodologies and tools for evaluating and improving interface usability, new models, and case studies and best practices in virtual, augmented and mixed reality systems, with a special focus on dynamic environments. It also discusses various factors concerning the human user, hardware, and artificial intelligence software. Based on the proceedings of the 2nd International Conference on Intelligent Human Systems Integration (IHSI 2019), held on February 7–10, 2019, in San Diego, California, USA, the book also examines the forces that are currently shaping the nature of computing and cognitive systems, such as the need to reduce hardware costs; the importance of infusing intelligence and automation; the trend toward hardware miniaturization and power reduction; the need for a better assimilation of computation in the environment; and social concerns regarding access to computers and systems for people with special needs. It offers a timely survey and a practice-oriented reference guide for policy- and decision-makers, human factors engineers, systems developers and users alike.

Book Usable Authentication with Recognition based Graphical Passwords

Download or read book Usable Authentication with Recognition based Graphical Passwords written by Martin Mihajlov and published by . This book was released on 2011 with total page 135 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Universal Access in Human Computer Interaction  Novel Design Approaches and Technologies

Download or read book Universal Access in Human Computer Interaction Novel Design Approaches and Technologies written by Margherita Antona and published by Springer Nature. This book was released on 2022-06-16 with total page 577 pages. Available in PDF, EPUB and Kindle. Book excerpt: This two-volume set constitutes the refereed proceedings of the 16th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2022, held as part of the 24th International Conference, HCI International 2022, held as a virtual event, in June-July 2022. A total of 1271 papers and 275 posters included in the 39 HCII 2022 proceedings volumes. UAHCI 2022 includes a total of 73 papers; they focus on topics related to universal access methods, techniques and practices, studies on accessibility, design for all, usability, UX and technology acceptance, emotion and behavior recognition for universal access, accessible media, access to learning and education, as well universal access to virtual and intelligent assistive environments.

Book Supporting Users in Password Authentication with Persuasive Design

Download or read book Supporting Users in Password Authentication with Persuasive Design written by Tobias Seitz and published by Tobias Seitz. This book was released on 2018-08-03 with total page 318 pages. Available in PDF, EPUB and Kindle. Book excerpt: Activities like text-editing, watching movies, or managing personal finances are all accomplished with web-based solutions nowadays. The providers need to ensure security and privacy of user data. To that end, passwords are still the most common authentication method on the web. They are inexpensive and easy to implement. Users are largely accustomed to this kind of authentication but passwords represent a considerable nuisance, because they are tedious to create, remember, and maintain. In many cases, usability issues turn into security problems, because users try to work around the challenges and create easily predictable credentials. Often, they reuse their passwords for many purposes, which aggravates the risk of identity theft. There have been numerous attempts to remove the root of the problem and replace passwords, e.g., through biometrics. However, no other authentication strategy can fully replace them, so passwords will probably stay a go-to authentication method for the foreseeable future. Researchers and practitioners have thus aimed to improve users' situation in various ways. There are two main lines of research on helping users create both usable and secure passwords. On the one hand, password policies have a notable impact on password practices, because they enforce certain characteristics. However, enforcement reduces users' autonomy and often causes frustration if the requirements are poorly communicated or overly complex. On the other hand, user-centered designs have been proposed: Assistance and persuasion are typically more user-friendly but their influence is often limited. In this thesis, we explore potential reasons for the inefficacy of certain persuasion strategies. From the gained knowledge, we derive novel persuasive design elements to support users in password authentication. The exploration of contextual factors in password practices is based on four projects that reveal both psychological aspects and real-world constraints. Here, we investigate how mental models of password strength and password managers can provide important pointers towards the design of persuasive interventions. Moreover, the associations between personality traits and password practices are evaluated in three user studies. A meticulous audit of real-world password policies shows the constraints for selection and reuse practices. Based on the review of context factors, we then extend the design space of persuasive password support with three projects. We first depict the explicit and implicit user needs in password support. Second, we craft and evaluate a choice architecture that illustrates how a phenomenon from marketing psychology can provide new insights into the design of nudging strategies. Third, we tried to empower users to create memorable passwords with emojis. The results show the challenges and potentials of emoji-passwords on different platforms. Finally, the thesis presents a framework for the persuasive design of password support. It aims to structure the required activities during the entire process. This enables researchers and practitioners to craft novel systems that go beyond traditional paradigms, which is illustrated by a design exercise.

Book End User Privacy in Human Computer Interaction

Download or read book End User Privacy in Human Computer Interaction written by Giovanni Iachello and published by Now Publishers Inc. This book was released on 2007 with total page 147 pages. Available in PDF, EPUB and Kindle. Book excerpt: Surveys the rich and diverse landscape of privacy in HCI and CSCW, describing some of the legal foundations and historical aspects of privacy, sketching out an overview of the body of knowledge with respect to designing, implementing, and evaluating privacy-affecting systems, and charting many directions for future work.

Book Practical UNIX and Internet Security

Download or read book Practical UNIX and Internet Security written by Simson Garfinkel and published by "O'Reilly Media, Inc.". This book was released on 2003-02-21 with total page 989 pages. Available in PDF, EPUB and Kindle. Book excerpt: When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.

Book Handbook of Social Psychology  Volume 1

Download or read book Handbook of Social Psychology Volume 1 written by Susan T. Fiske and published by John Wiley & Sons. This book was released on 2010-02-15 with total page 899 pages. Available in PDF, EPUB and Kindle. Book excerpt: First published in 1935, The Handbook of Social Psychology was the first major reference work to cover the field of social psychology. The field has since evolved and expanded tremendously, and in each subsequent edition, The Handbook of Social Psychology is still the foremost reference that academics, researchers, and graduate students in psychology turn to for the most current, well-researched, and thorough information covering the field of social psychology. This volume of the Fifth Edition covers the science of social psychology and the social being.

Book Contextual Design

    Book Details:
  • Author : Hugh Beyer
  • Publisher : Morgan Kaufmann
  • Release : 1998
  • ISBN : 1558604111
  • Pages : 498 pages

Download or read book Contextual Design written by Hugh Beyer and published by Morgan Kaufmann. This book was released on 1998 with total page 498 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is the only book that describes a complete approach to customer-centered design, from customer data to system design. Readers will be able to develop the work models that represent all aspects of customer work practices.

Book Social Isolation and Loneliness in Older Adults

Download or read book Social Isolation and Loneliness in Older Adults written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2020-05-14 with total page 317 pages. Available in PDF, EPUB and Kindle. Book excerpt: Social isolation and loneliness are serious yet underappreciated public health risks that affect a significant portion of the older adult population. Approximately one-quarter of community-dwelling Americans aged 65 and older are considered to be socially isolated, and a significant proportion of adults in the United States report feeling lonely. People who are 50 years of age or older are more likely to experience many of the risk factors that can cause or exacerbate social isolation or loneliness, such as living alone, the loss of family or friends, chronic illness, and sensory impairments. Over a life course, social isolation and loneliness may be episodic or chronic, depending upon an individual's circumstances and perceptions. A substantial body of evidence demonstrates that social isolation presents a major risk for premature mortality, comparable to other risk factors such as high blood pressure, smoking, or obesity. As older adults are particularly high-volume and high-frequency users of the health care system, there is an opportunity for health care professionals to identify, prevent, and mitigate the adverse health impacts of social isolation and loneliness in older adults. Social Isolation and Loneliness in Older Adults summarizes the evidence base and explores how social isolation and loneliness affect health and quality of life in adults aged 50 and older, particularly among low income, underserved, and vulnerable populations. This report makes recommendations specifically for clinical settings of health care to identify those who suffer the resultant negative health impacts of social isolation and loneliness and target interventions to improve their social conditions. Social Isolation and Loneliness in Older Adults considers clinical tools and methodologies, better education and training for the health care workforce, and dissemination and implementation that will be important for translating research into practice, especially as the evidence base for effective interventions continues to flourish.

Book The Art of Deception

    Book Details:
  • Author : Kevin D. Mitnick
  • Publisher : John Wiley & Sons
  • Release : 2011-08-04
  • ISBN : 076453839X
  • Pages : 375 pages

Download or read book The Art of Deception written by Kevin D. Mitnick and published by John Wiley & Sons. This book was released on 2011-08-04 with total page 375 pages. Available in PDF, EPUB and Kindle. Book excerpt: The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Book People and Computers XII

    Book Details:
  • Author : Harold Thimbleby
  • Publisher : Springer Science & Business Media
  • Release : 2013-03-14
  • ISBN : 1447136012
  • Pages : 419 pages

Download or read book People and Computers XII written by Harold Thimbleby and published by Springer Science & Business Media. This book was released on 2013-03-14 with total page 419 pages. Available in PDF, EPUB and Kindle. Book excerpt: Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.

Book White Space Is Not Your Enemy

Download or read book White Space Is Not Your Enemy written by Kim Golombisky and published by CRC Press. This book was released on 2017-02-17 with total page 612 pages. Available in PDF, EPUB and Kindle. Book excerpt: White Space Is Not Your Enemy is a practical graphic design and layout guide that introduces concepts and practices necessary for producing effective visual communication across a variety of formats—from web to print. Sections on Gestalt theory, color theory, and WET layout are expanded to offer more in-depth content on those topics. This new edition features new covering current trends in web design—Mobile-first, UI/UX design, and web typography—and how they affect a designer’s approach to a project. The entire book will receive an update using new examples and images that show a more diverse set of graphics that go beyond print and web and focus on tablet, mobile and advertising designs.

Book Digital Media  Youth  and Credibility

Download or read book Digital Media Youth and Credibility written by Miriam J. Metzger and published by MIT Press. This book was released on 2008 with total page 212 pages. Available in PDF, EPUB and Kindle. Book excerpt: The difficulties in determining the quality of information on the Internet--in particular, the implications of wide access and questionable credibility for youth and learning. Today we have access to an almost inconceivably vast amount of information, from sources that are increasingly portable, accessible, and interactive. The Internet and the explosion of digital media content have made more information available from more sources to more people than at any other time in human history. This brings an infinite number of opportunities for learning, social connection, and entertainment. But at the same time, the origin of information, its quality, and its veracity are often difficult to assess. This volume addresses the issue of credibility--the objective and subjective components that make information believable--in the contemporary media environment. The contributors look particularly at youth audiences and experiences, considering the implications of wide access and the questionable credibility of information for youth and learning. They discuss such topics as the credibility of health information online, how to teach credibility assessment, and public policy solutions. Much research has been done on credibility and new media, but little of it focuses on users younger than college students. Digital Media, Youth, and Credibility fills this gap in the literature. Contributors Matthew S. Eastin, Gunther Eysenbach, Brian Hilligoss, Frances Jacobson Harris, R. David Lankes, Soo Young Rieh, S. Shyam Sundar, Fred W. Weingarten