4,216 research outputs found

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    The F@ Framework of Designing Awareness Mechanisms in Instant Messaging

    Get PDF
    This paper presents our research on awareness support in Instant Messaging (IM). The paper starts with a brief overview of empirical study of IM, using an online survey and face-to-face interviews to identify user needs for awareness support. The study identified a need for supporting four aspects of awareness, awareness of multiple concurrent conversations, conversational awareness, presence awareness of a group conversation, and visibility of moment-to-moment listeners and viewers. Based on the empirical study and existing research on awareness, we have developed the F@ (read as fat) framework of awareness. F@ comprises of the abstract level and the concrete level. The former includes an in-depth description of various awareness aspects in IM, whilst the latter utilises temporal logic to formalise fundamental time-related awareness aspects. F@ helps developers gain a better understanding of awareness and thereby design usable mechanisms to support awareness. Applying F@, we have designed several mechanisms to support various aspect of awareness in IM

    Risk assessment of email accounts: Difference between perception and reality

    Get PDF
    The use of Internet is associated with a growing number of security threats. This thesis analyzes how users perceive the security of their email account based on the email account provider. With our study, we aim to contribute to the information security systems literature in three ways: First, by taking a more complete view on security online, and reviewing the concept of usable security, usability, human-computer interaction, trust and user perception. Second, by performing an analysis of providers of online services specifically emails. Third, by applying a renowned risk analysis method called Information Security Risk Analysis Method (ISRAM) for risk assessment. The ISRAM analysis revealed that Hotmail, Gmail and Yahoo email accounts have a medium risk level, while the reality analysis demonstrated no clearly more secure account provider with only low level risk counts

    Exploring participatory design for SNS-based AEH systems

    Get PDF
    The rapidly emerging and growing social networking sites (SNS) offer an opportunity to improve adaptive e-learning experience by introducing a social dimension, connecting users within the system. Making connections and providing communication tools can engage students in creating effective learning environment and enriching learning experiences. Researchers have been working on introducing SNS features into adaptive educational hypermedia systems. The next stage research is centered on how to enhance SNS facilities of AEH systems, in order to engage students’ participation in collaborative learning and generating and enriching learning materials. Students are the core participants in the adaptive e-learning process, so it is essential for the system designers to consider students’ opinions. This paper aims at exploring how to apply participatory design methodology in the early stage of the SNS-based AEH system design process

    THE NEXT STEP – OPEN PROTOTYPING

    Get PDF
    Software applications in the car are gaining in importance as a driver for innovation and value creation for the car manufacturers and their suppliers. These novel software functions, e.g., mobile services or car-to-car enabled applications, are increasingly designed and developed using early prototypes. Building on open innovation literature, this paper goes beyond extant knowledge on prototyping and proposes a novel paradigm of ‘open prototyping’. It assumes that organizations can and should use external input as well as internal input in form of prototypes, as the firms look to advance their technology. Set in the empirical field of the automotive industry, we follow a design-oriented research approach to design, develop and evaluate an open prototyping approach consisting of a toolkit and process. The open prototyping toolkit, HIMEPP, has a component-oriented architecture. Combined with the open prototyping process, it supports the development of diagonal high-fidelity prototypes together with persons from outside the R&D department. The study allows for generalizations to other industries and points to significant managerial as well as academic implications, which can be expected from opening the next step of the innovation process
    corecore