Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

ubicomp (ubiquitous computing)

     Faces prototype

         design

     HCI and

         Confab system

uncued recall 2nd

unisog

Unix

     disk sanitization and

     file access, securing

     password restrictions

unlink( ) (POSIX), changing semantics of

URL hiding, phishing attacks and

usability

     benchmark studies

     biometric authentication systems, evaluating 2nd

     criterion for designing/evaluating challenge questions systems 2nd

    engineering

         HCI research

     graphical passwords

     hard drives 2nd

     in design/development phases of product development

     in postrelease phase of product development

     in privacy policy management tool, case study

         policy authoring, evaluating

         privacy needs, identifying

         prototype, designing/evaluating

         users, interviewing

     in requirements phase of product development

     in security application, case study

         interface, testing

         ROI analysis

         work context, field study of

     in software/hardware life cycle

     keystroke biometrics

     objectives

         performance data

     PGP program v5.0

     PKIs and

     portable devices

     privacy and

         P2P systems

     remote data collection/system evaluation

     smart cards

     systemic approach to

     unique aspects of, in privacy/security domain

     user error and

     value-sensitive design

usable biometrics

USB tokens 2nd

     recommendations

     usability study of

         aim/scope of

         context/roles definition

         measurement apparatus

         results/interpretation

         user selection

use limitation, privacy criterion for challenge questions system

USENET newsgroups, patch distribution

user experiences, eBay user profiles

user group meetings, survey/questionnaire data collection/analysis

users

    actions of

         phishing attack defense

     alerting, Bugnosis

     anonymity sets

     attackers and, exploiting differences

     awareness of

         distributed/collaborative applications

         information disclosure

         privacy-protective behaviors

         web security, Bugnosis

     behavior in sociotechnical systems 2nd

         policing, consequences of

         security culture, building

     beliefs/attitudes 2nd

     browsers, hidden information

     children/adolescents

     clustering, interface design approach

     compliance of

     consent indications

     decision-making process

     demands on

         reducing 2nd

     educating

         privacy management

         Shred Trash command

     efforts of, minimizing

     expectations, security operations

     experiences

         biometric authentication and

         on eBay

     feedback in postrelease

     gesture-based configuration

     hard drives, directly addressable data

    identifying

         keystroke digraphs

     in academic environments

     in e-commerce transactions, assessing risks

    information about

         collecting/analyzing with online tools

         concerns about publicizing

         downloading files

         user fine-grained control

     informing through interaction design, web browsers

     knowledge of, web security study

     meaningful actions, system configuration supporting 2nd 3rd

     minimal distraction of

     motivating 2nd

     partnership with

     passwords

         remembering

         written down 2nd

     perceptions of, phishing attacks and

     PKI and

     privacy issues 2nd 3rd 4th

         Bugnosis privacy-analysis tool

         coarse-grained control 2nd

         difficulty articulating 2nd

         information about, providing

         information, supporting flow of

         interviews about

         P3P user agent design

     profiles of 2nd 3rd

     protection, designing systems

     psychological manipulation by interface

     requirements of 2nd

     rules for shredding files

    skills of

         accommodating

         exploiting

         psychological acceptability applied to

     support calls from, analysis of

     system design/development

     system design/development, involving in

     tracking

     training, biometric authentication systems

     trust and

     types of, accommodating all

     understanding of security

     weakest link property 2nd 3rd 4th

     work context, field studies of

     work practices 2nd

Категории