3,154 research outputs found

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Theticity

    Get PDF
    The subject matter of this chapter is the semantic, syntactic and discoursepragmatic background as well as the cross-linguistic behavior of types of utterance exemplified by the following English sentences [
]: (1) My NECK hurts. [
] (2) The PHONE's ringing. [...] Sentences such as [
] are usually held to stand in opposition to sentences with a topical subject. The difference is said to be formally marked, for example, by VS order vs. topical SV order (as in Albanian po bie telefoni 'the PHONE is ringing' vs. telefoni po bie 'the PHONE is RINGING'), or by accent on the subject only vs. accent on both the subject and the verb (as in the English translations). The term theticity will be used in the following to label the specific phenomenological domain to which the sentences in (1) and (2) belong. It has long been commonplace that these and similar expressions occur at particular points in the discourse where "a new situation is presented as a whole". We will try to depict and classify the various discourse situations in which these expressions have been found in the different languages, and we will try to trace out areas of cross-linguistic comparability. Finally, we will raise the question whether or not there is a common denominator which would justify a unified treatment of all these expressions in functional/semantic terms

    The true cost of unusable password policies: password use in the wild

    Get PDF
    HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We present a study which re-examined password policies and password practice in the workplace today. 32 staff members in two organisations kept a password diary for 1 week, which produced a sample of 196 passwords. The diary was followed by an interview which covered details of each password, in its context of use. We find that users are in general concerned to maintain security, but that existing security policies are too inflexible to match their capabilities, and the tasks and contexts in which they operate. As a result, these password policies can place demands on users which impact negatively on their productivity and, ultimately, that of the organisation. We conclude that, rather than focussing password policies on maximizing password strength and enforcing frequency alone, policies should be designed using HCI principles to help the user to set an appropriately strong password in a specific context of use

    Catalysts for the decomposition of hydrazine, hydrazine derivatives and mixtures of both

    Get PDF
    This invention concerns a catalyst designed for the decomposition of hydrazine, hydrazine derivatives and mixtures of the two. The objective is to develop a catalyst of the type described that is cheap and easy to produce and is also characterized by extremely short response times
    • 

    corecore