People and Computers XII Proceedings of HCI '97
Başlık:
People and Computers XII Proceedings of HCI '97
ISBN:
9781447136019
Edition:
1st ed. 1997.
Yayın Bilgileri:
London : Springer London : Imprint: Springer, 1997.
Fiziksel Tanımlama:
XI, 420 p. 51 illus. online resource.
Contents:
Making Passwords Secure and Usable -- Strategies for Organising Email -- Navigating Telephone-Based Interfaces with Earcons -- Do Users Always Benefit When User Interfaces Are Consistent? -- Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool -- Computer Anxiety and the Human-Computer Interface -- Towards a Situated Action Calculus for Modelling Interactions -- Explorations in Sonic Browsing -- Remote Homeplace Communication: What is It Like and How Might We Support It? -- A Making-Movies Metaphor for Structuring Software Components in Highly Interactive Applications -- The Impact of Time and Place on the Operation of Mobile Computing Devices -- The Impact of Marginal Utility and Time on Distributed Information Retrieval -- Computer-Assisted Remote Control for the User with Motor Impairment -- Research and the Design of Human-Computer Interactions or 'What Happened to Validation?' -- Using Diagrams to Support the Analysis of System 'Failure' and Operator 'Error' -- The Interactional Affordances of Technology: An Ethnography of Human-Computer Interaction in an Ambulance Control Centre -- Why, What, Where, When: Architectures for Cooperative work on the World Wide Web -- BUILD-IT: A Computer Vision-based Interaction Technique for a Planning Tool -- Formally Comparing and Informing Notation Design -- Direct Object Manipulation vs Direct Concept Manipulation: Effect of Interface Style on Reflection and Domain Learning -- HyperAT: HCI and Web Authoring -- Separating User Knowledge of Domain and Device: A Framework -- Eliciting Information Portrayal Requirements: Experiences with the Critical Decision Method -- Author Index -- Keyword Index.
Abstract:
Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.
Ek Kurum Yazarı:
Elektronik Erişim:
Full Text Available From Springer Nature Computer Science Archive Packages
Dil:
English