7,943 research outputs found

    Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Full text link
    Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding and using security mecha-nisms. Other security mechanisms are simply annoying for end users. As the overall security of any system is only as strong as the weakest link in this system, bad usability of IT security mechanisms may result in operating errors, resulting in inse-cure systems. Buying decisions of end users may be affected by the usability of security mechanisms. Hence, software provid-ers may decide to better have no security mechanism then one with a bad usability. Usability of IT security mechanisms is one of the most underestimated properties of applications and sys-tems. Even IT security itself is often only an afterthought. Hence, usability of security mechanisms is often the after-thought of an afterthought. This paper presents some guide-lines that should help software developers to improve end user usability of security-related mechanisms, and analyzes com-mon applications based on these guidelines. Based on these guidelines, the usability of email encryption is analyzed and an email encryption solution with increased usability is presented. The approach is based on an automated key and trust man-agement. The compliance of the proposed email encryption solution with the presented guidelines for usable security mechanisms is evaluated

    CLOSING INSTITUTIONAL GAPS THROUGH ACADEMIC RESEARCH MANAGEMENT SYSTEM AND IMPLICATIONS IN NIGERIA

    Get PDF
    The world today has a number of valuable research scholars desiring connections and collaborations. The existing online collaboration platforms are not sufficient to accommodate the totality of researchers desiring dynamic platforms to network globally. Despite growing contributions in the literature on Social Network Site (SNS), regarding the capacity to connect people remotely, there is still a dearth of research on how SNS potentially integrates academics into social capital formation. The objective of this study is to provide Academic Research Management System (ARMS) for the research community. The research methods that were employed for the study include unified modeling language (UML) for the design; and Hypertext Mark-up Language (HTML), Hypertext Preprocessor (PHP) and MySQL for front end, server side programming and database respectively. The system was evaluated for usability and the implications for deploying the ARMS in Nigeria were also considered in this study. Findings: The findings from the usability survey showed a good usability based on total rating of 4.10 out of 5 point scale. The integration of the system into the academic institutions worldwide would foster a rapport between academics in all fields of learning and provide a means to have access to colleagues and research materials when needed

    Assessment of the Turkish Local e-Governments: An Empirical Study

    Get PDF
    In this research, we first evaluated the current practices of the Turkish local e-governments. Then, building upon an earlier study of local e-governments in Europe (Key Elements for Electronic Local Authorities’ Networks [KEeLAN], 2002), we compared the Turkish local e-government stages with their European counterparts to give a broader perspective. The basic framework focuses on the evaluation of current practices on the supply side (government), rather than the demand side (citizen). The emphasis of this research is on the evaluation of each web site in terms of nine basic public services (additional sub-services available) comprised of policy making, economic development, personal documents, credit and loans/financial support, education, building permits, environment, culture and leisure, and information dissemination. It is assumed that at least four of those services (randomly) are supplied in a local context among the Member Countries, including Turkey. We suggest the results might provide a deeper understanding of local e-governments in Turkey and lend support to advances in this under-researched area.Local government, local e-government, e-government, e-municipality, e-service, e-Europe, e-Turkey

    Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies

    Get PDF
    Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical experiments is very crucial in order to study and to analyze all malicious and deceiving phishing website attack techniques and strategies. In this paper, three different kinds of phishing experiment case studies have been conducted to shed some light into social engineering attacks, such as phone phishing and phishing website attacks for designing effective countermeasures and analyzing the efficiency of performing security awareness about phishing threats. Results and reactions to our experiments show the importance of conducting phishing training awareness for all users and doubling our efforts in developing phishing prevention techniques. Results also suggest that traditional standard security phishing factor indicators are not always effective for detecting phishing websites, and alternative intelligent phishing detection approaches are needed

    E-Service Quality Model of B2C Online Shopping Platform Based on User’S Perspective

    Get PDF
    In recent year, B2C has gradually become the main driving force of the network shopping market development, many B2C online shopping platform weakens the differences in product and price, which intensify the competition on e-service quality among B2C online shopping platform. Therefore, this paper discusses the composition of electronic service quality model of B2C online shopping platform from the user’s perspective, combining with the analysis of literature and the trading process. And the e-service quality model, which has carried on the empirical test, determined the evaluation index of e-service quality evaluation for B2C e-commerce platform. The results of this study show that e-service quality evaluation model of B2C online shopping platform is composed of seven dimensions and twenty-nine measurement items
    corecore