IoT Information Security Evaluation for Developers and Users
نویسندگان
چکیده
منابع مشابه
Users, developers and dilemmas
This paper presents the results of an ethnography of a small evolutionary software development project in a British oil company, focusing on the relationship between users and software developers. The discussion starts by looking at how activities come to be defined as either “user” or “developer” jobs. At the company studied there was considerable conflict over the user development of Lotus No...
متن کاملHackers, Users, Information Security
We analyze the strategic interactions among end-users and between end-users and a hacker. We show that security efforts by end users are strategic substitutes. This explains the inertia among end-users in taking precautions even in the face of grave potential consequences. Next, we analyze the direct and indirect effects of changes in user fixing cost and the rate of enforcement against hacking...
متن کاملOn the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users
One of the main security mechanisms in Android is the permission system. Previous research has pointed out that this system is too coarse-grained. Hence, several mechanisms have been proposed to address this issue. However, to date, the impact of changes in the current permission system on both end users and software developers has not been studied, and no significant work has been done to dete...
متن کاملEffective Information Processing between Users and Developers during Information System Project Development
When users participate in information system (IS) project development, the lack of linkage between developers and users may hinder the achievement of effective information processing. The purpose of this study is to explore the effect of various linkages on information processing capacity. This paper studied information flows of seven projects in an IT company in Singapore. Analysis archival da...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security and Cryptography (Enigma)
سال: 2018
ISSN: 2595-5217
DOI: 10.17648/enigma.v4i1.63