You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Activities like text-editing, watching movies, or managing personal finances are all accomplished with web-based solutions nowadays. The providers need to ensure security and privacy of user data. To that end, passwords are still the most common authentication method on the web. They are inexpensive and easy to implement. Users are largely accustomed to this kind of authentication but passwords represent a considerable nuisance, because they are tedious to create, remember, and maintain. In many cases, usability issues turn into security problems, because users try to work around the challenges and create easily predictable credentials. Often, they reuse their passwords for many purposes, wh...
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The total of 39 contributions was carefully reviewed and selected for inclusion in the HAS proceedings. The papers are organized in the following topical sections: novel authentication systems; human factors in security; security and privacy policies; and user centric security and privacy.
Surveillance : Citizens and the state, 2nd report of session 2008-09, Vol. 2: Evidence
This report focuses upon the Home Office's identity cards scheme, which uses various technologies including biometrics, information and communication technology (ICT) and smart cards. It explores the ways in which scientific advice, risk and evidence are being managed in relation to technologies that are continually developing. The Home Office has followed good practice by the establishment of advisory committees, the use of Office of Government Commerce (OGC) Gateway Reviews and the development of risk management strategies, along with a policy of gradual implementation. But the Committee has identified weaknesses in the use of scientific advice and evidence. There has been a lack of transp...
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
The concept of mental models is an important approach within cognitive psychology. This invaluable new book surveys a broad range of mental models in the context of human-computer interaction, complex computer systems, and cognitive psychology as a whole. It is be of great interest to students and researchers in cognitive psychology and HCI.
The theme of the seventeenth British human-computer interaction conference is designing for society. Contributions range from innovations in computerized ambulance dispatch team work to overcoming usability limitations and game-playing in multi-user sessions.
A sesquicentennial history of the Town of Wolf River, Winnebago County, Wisconsin from 1855 - 2005 reminiscing the town's early history, past and present town officials and residents, service men and women from the civil war to present, and histories of the town's churches, cemeteries, schools, businesses and organizations.
Examining the rapidly growing field of remote computer-based learning, this title discusses how to use and create a Web-based system for teaching and learning, using groupware for collaboration, multimedia, distance learning, and much more.