11,673 research outputs found

    An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users

    Get PDF
    A good portion of today\u27s investigations include, at least in part, an examination of the user\u27s web history. Although it has lost ground over the past several years, Microsoft\u27s Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of recent browsing history in spite of the users attempts to delete historical artifacts. As investigators, we must continually be looking for new sources of evidence; Automatic Crash Recovery is it

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content

    Persistent issues in encryption software: A heuristic and cognitive walkthrough

    Get PDF
    The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security. One mechanism for ensuring the integrity and confidentiality of information is encryption software. Unfortunately, software usability issues can hinder an end-user’s capability to properly utilise the security features effectively. To date there has been little research in investigating the usability of encryption software and proposing solutions for improving them. This research paper analysed the usability of encryption software targeting end-users. The research identified several issues that could impede the ability of a novice end-user to adequately utilise the encryption software. A set of proposed recommendations are suggested to improve encryption software which could be empirically verified through further research

    An Australian Perspective on the Challenges for Computer and Network Security for Novice Endusers

    Get PDF
    It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately

    Securing the Elderly: A Developmental Approach to Hypermedia Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content. It subsequently demonstrates a solution designed with the elderly, yet novice, end-user in mind. This paper examines the need for practical computer-based instructions that have wide-ranging applications to a wide selection of under-informed internet consumers. As computer usage rapidly spreads towards total ubiquity across all generations and social levels, the need for web-based education resources to protect generationally differing internet users is urgently required

    Front Matter

    Get PDF

    Protecting the infrastructure: 3rd Australian information warfare & security conference 2002

    Get PDF
    The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year\u27s conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations. The papers cover many topics, all within the field of information warfare and its applications, now and into the future. The papers have been grouped into six streams: • Networks • IWAR Strategy • Security • Risk Management • Social/Education • Infrastructur

    Human-computer interaction for development (HCI4D):the Southern African landscape

    Get PDF
    Human-Computer interaction for development (HCI4D) research aims to maximise the usability of interfaces for interacting with technologies designed specifically for under-served, under-resourced, and under-represented populations. In this paper we provide a snapshot of the Southern African HCI4D research against the background of the global HCI4D research landscape.We commenced with a systematic literature review of HCI4D (2010-2017) then surveyed Southern African researchers working in the area. The contribution is to highlight the context- specific themes and challenges that emerged from our investigation

    The seamless integration of Web3D technologies with university curricula to engage the changing student cohort

    Get PDF
    The increasing tendency of many university students to study at least some courses at a distance limits their opportunities for the interactions fundamental to learning. Online learning can assist but relies heavily on text, which is limiting for some students. The popularity of computer games, especially among the younger students, and the emergence of networked games and game-like virtual worlds offers opportunities for enhanced interaction in educational applications. For virtual worlds to be widely adopted in higher education it is desirable to have approaches to design and development that are responsive to needs and limited in their resource requirements. Ideally it should be possible for academics without technical expertise to adapt virtual worlds to support their teaching needs. This project identified Web3D, a technology that is based on the X3D standards and which presents 3D virtual worlds within common web browsers, as an approach worth exploring for educational application. The broad goals of the project were to produce exemplars of Web3D for educational use, together with development tools and associated resources to support non-technical academic adopters, and to promote an Australian community of practice to support broader adoption of Web3D in education. During the first year of the project exemplar applications were developed and tested. The Web3D technology was found to be still in a relatively early stage of development in which the application of standards did not ensure reliable operation in different environments. Moreover, ab initio development of virtual worlds and associated tools proved to be more demanding of resources than anticipated and was judged unlikely in the near future to result in systems that non-technical academics could use with confidence. In the second year the emphasis moved to assisting academics to plan and implement teaching in existing virtual worlds that provided relatively easy to use tools for customizing an environment. A project officer worked with participating academics to support the teaching of significant elements of courses within Second LifeTM. This approach was more successful in producing examples of good practice that could be shared with and emulated by other academics. Trials were also conducted with ExitRealityTM, a new Australian technology that presents virtual worlds in a web browser. Critical factors in the success of the project included providing secure access to networked computers with the necessary capability; negotiating the complexity of working across education, design of virtual worlds, and technical requirements; and supporting participants with professional development in the technology and appropriate pedagogy for the new environments. Major challenges encountered included working with experimental technologies that are evolving rapidly and deploying new networked applications on secure university networks. The project has prepared the way for future expansion in the use of virtual worlds for teaching at USQ and has contributed to the emergence of a national network of tertiary educators interested in the educational applications of virtual worlds
    • …
    corecore