Computer security impaired by legitimate users
نویسندگان
چکیده
منابع مشابه
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. One other view is about the role played by legitimate users of systems in impairing the level of protection. In order to address this issue, we wish to adopt a multidisciplinary standpoint and investigate some of the human aspects involved in computer security. From research in psychology, it is known that people ...
متن کاملComputer security impaired by legal users
Computer security has traditionally been assessed from a technical point of view. In this paper, we wish to adopt a cognitive standpoint and investigate some of the cognitive processes involved in computer security. One angle which is not considered very often is the active role played by legal users of systems in impairing the level of protection. In this paper, we thus attempt to highlight th...
متن کاملVirtual computer monitor for visually-impaired users
Conventional computer display products for the visually impaired are limited by the amount of enlarged imagery that can be displayed at any one time, and by awkward methods for navigating about the scene. This paper describes a prototype system designed to address these problems by providing a head-mounted display interface which allows the user to position a cursor anywhere on an enlarged virt...
متن کاملFactors Impacting Animation in Icons for Visually Impaired Computer Users
Icons are commonplace in Graphical User Interfaces. These same components that are intended to make computers easy to use can make technology difficult to access for the visually impaired. Eliminating icons would be unrealistic, but re-examining icons is a starting point in increasing accessibility in GUIs. A project is underway where animation is being added to icons in order to assist visuall...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2004
ISSN: 0167-4048
DOI: 10.1016/j.cose.2003.09.002