7,943 research outputs found
Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption
Nowadays, advanced security mechanisms exist to protect data, systems, and
networks. Most of these mechanisms are effective, and security experts can
handle them to achieve a sufficient level of security for any given system.
However, most of these systems have not been designed with focus on good
usability for the average end user. Today, the average end user often struggles
with understanding and using security mecha-nisms. Other security mechanisms
are simply annoying for end users. As the overall security of any system is
only as strong as the weakest link in this system, bad usability of IT security
mechanisms may result in operating errors, resulting in inse-cure systems.
Buying decisions of end users may be affected by the usability of security
mechanisms. Hence, software provid-ers may decide to better have no security
mechanism then one with a bad usability. Usability of IT security mechanisms is
one of the most underestimated properties of applications and sys-tems. Even IT
security itself is often only an afterthought. Hence, usability of security
mechanisms is often the after-thought of an afterthought. This paper presents
some guide-lines that should help software developers to improve end user
usability of security-related mechanisms, and analyzes com-mon applications
based on these guidelines. Based on these guidelines, the usability of email
encryption is analyzed and an email encryption solution with increased
usability is presented. The approach is based on an automated key and trust
man-agement. The compliance of the proposed email encryption solution with the
presented guidelines for usable security mechanisms is evaluated
CLOSING INSTITUTIONAL GAPS THROUGH ACADEMIC RESEARCH MANAGEMENT SYSTEM AND IMPLICATIONS IN NIGERIA
The world today has a number of valuable research scholars desiring connections and collaborations. The existing online
collaboration platforms are not sufficient to accommodate the totality of researchers desiring dynamic platforms to
network globally. Despite growing contributions in the literature on Social Network Site (SNS), regarding the capacity to
connect people remotely, there is still a dearth of research on how SNS potentially integrates academics into social
capital formation. The objective of this study is to provide Academic Research Management System (ARMS) for the
research community. The research methods that were employed for the study include unified modeling language (UML)
for the design; and Hypertext Mark-up Language (HTML), Hypertext Preprocessor (PHP) and MySQL for front end,
server side programming and database respectively. The system was evaluated for usability and the implications for
deploying the ARMS in Nigeria were also considered in this study. Findings: The findings from the usability survey
showed a good usability based on total rating of 4.10 out of 5 point scale. The integration of the system into the academic
institutions worldwide would foster a rapport between academics in all fields of learning and provide a means to have
access to colleagues and research materials when needed
Assessment of the Turkish Local e-Governments: An Empirical Study
In this research, we first evaluated the current practices of the Turkish local e-governments. Then, building upon an earlier study of local e-governments in Europe (Key Elements for Electronic Local Authorities’ Networks [KEeLAN], 2002), we compared the Turkish local e-government stages with their European counterparts to give a broader perspective. The basic framework focuses on the evaluation of current practices on the supply side (government), rather than the demand side (citizen). The emphasis of this research is on the evaluation of each web site in terms of nine basic public services (additional sub-services available) comprised of policy making, economic development, personal documents, credit and loans/financial support, education, building permits, environment, culture and leisure, and information dissemination. It is assumed that at least four of those services (randomly) are supplied in a local context among the Member Countries, including Turkey. We suggest the results might provide a deeper understanding of local e-governments in Turkey and lend support to advances in this under-researched area.Local government, local e-government, e-government, e-municipality, e-service, e-Europe, e-Turkey
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical experiments is very crucial in order to study and to analyze all malicious and deceiving phishing website attack techniques and strategies. In this paper, three different kinds of phishing experiment case studies have been conducted to shed some light into social engineering attacks, such as phone phishing and phishing website attacks for designing effective countermeasures and analyzing the efficiency of performing security awareness about phishing threats. Results and reactions to our experiments show the importance of conducting phishing training awareness for all users and doubling our efforts in developing phishing prevention techniques. Results also suggest that traditional standard security phishing factor indicators are not always effective for detecting phishing websites, and alternative intelligent phishing detection approaches are needed
Recommended from our members
Investigating design features of a computer-mediated communication system
Computer-mediated communication (CMC) is increasingly used in higher education, but it is not without problems. The effectiveness of CMC depends on many factors, including the characteristics of CMC systems themselves. The research reported here therefore aimed to investigate how an educational CMC system might be improved, in order to support learning more effectively.
The main context for the research was distance learning at the UK Open University (OU). A two-stage, mixed methods research approach was adopted. In the first stage, interviews and observations were carried out to explore the benefits and problems experienced by users. This revealed two major issues: information overload and lack of social presence. Information overload relates to users’ problems dealing with large numbers of messages. Social presence relates to the need for users to feel connected with each other.
The second stage investigated system features aimed at addressing these issues, implemented in a prototype computer conferencing system. Features to address overload included branched message threading and user recommendations. Features to address social presence were ‘résumés’ and instant messaging. These features were evaluated using questionnaires, with several cohorts of students in an OU course.
Students expressed approval of the features, although some features were not widely used. Students preferred branched threading to chronological threading because branching helped them to follow ‘conversations’. Students were uncomfortable recommending messages, feeling that the value of a message would vary between people. They were also uncomfortable using instant messaging to contact others whom they did not know. However, the awareness aspect of instant messaging provided a sense of solidarity.
The research demonstrated that the problems of overload and lack of social presence are significant, and each has social aspects which must be addressed. Students’ relationships with each other affect whether and how they use the features of CMC systems. We can conclude that particular attention must be paid to the social aspects of online communication, both when designing educational CMC systems and when considering how they are used. To maximise the benefits for learning, students need to feel comfortable with each other online, and there are few short cuts to achieving this
E-Service Quality Model of B2C Online Shopping Platform Based on User’S Perspective
In recent year, B2C has gradually become the main driving force of the network shopping market development, many B2C online shopping platform weakens the differences in product and price, which intensify the competition on e-service quality among B2C online shopping platform. Therefore, this paper discusses the composition of electronic service quality model of B2C online shopping platform from the user’s perspective, combining with the analysis of literature and the trading process. And the e-service quality model, which has carried on the empirical test, determined the evaluation index of e-service quality evaluation for B2C e-commerce platform. The results of this study show that e-service quality evaluation model of B2C online shopping platform is composed of seven dimensions and twenty-nine measurement items
- …