How do you make information security user friendly?
نویسندگان
چکیده
منابع مشابه
How do you make information security user friendly?
The security of the information assets is a requirement for all types of organisation, whether to protect the business or to meet legal or regulatory requirements. The security of information is not a new problem that has arisen with the increasing use of computing to process store and transmit information, it is just an old problem in a new environment. Before computers, we had filing cabinets...
متن کاملHow to Make Corba Objects User-Friendly with GOODE?
The future of distributed client/server computing will consist of the WWW and Corba environments. First, the WWW is the user-friendly uniform interface to access any distributed resource. Second, Corba is a single uniform object-oriented view of distributed and heterogeneous systems integration. Then these two worlds need to merge to make distributed objects user-friendly. This paper rst presen...
متن کاملBeyond the Wall of Text: How Information Design Can Make Contracts User-Friendly
This study investigates the unique contribution of layout and visual cues to the comprehension of complex texts. Contracts are taken as a key example of cumbersome, complex texts that most laypeople do not like to read, and avoid reading altogether if possible. By means of information design, the meaning of contracts can be made more readily visible and understandable to their intended user-gro...
متن کاملThat's how you make drugs!
Although the science is able to proof that a drug works for the BRCA mutation in breast cancer, prostate cancer and pancreatic cancer (and maybe in other BRCA-mutated cancers) we stick to the registration path of doing phase 1, 2 and 3 trials based on organs. With the knowledge of today and the practice of personalized medicine we are able to give the drug olaparib much faster and save lives or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Security Technical Report
سال: 2009
ISSN: 1363-4127
DOI: 10.1016/j.istr.2010.04.001