U


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

ubicomp (ubiquitous computing)
     Faces prototype
         design
     HCI and
         Confab system
uncued recall 2nd
unisog
Unix
     disk sanitization and
     file access, securing
     password restrictions
unlink( ) (POSIX), changing semantics of
URL hiding, phishing attacks and
usability
     benchmark studies
     biometric authentication systems, evaluating 2nd
     criterion for designing/evaluating challenge questions systems 2nd
    engineering
         HCI research
     graphical passwords
     hard drives 2nd
     in design/development phases of product development
     in postrelease phase of product development
     in privacy policy management tool, case study
         policy authoring, evaluating
         privacy needs, identifying
         prototype, designing/evaluating
         users, interviewing
     in requirements phase of product development
     in security application, case study
         interface, testing
         ROI analysis
         work context, field study of
     in software/hardware life cycle
     keystroke biometrics
     objectives
         performance data
     PGP program v5.0
     PKIs and
     portable devices
     privacy and
         P2P systems
     remote data collection/system evaluation
     smart cards
     systemic approach to
     unique aspects of, in privacy/security domain
     user error and
     value-sensitive design
usable biometrics
USB tokens 2nd
     recommendations
     usability study of
         aim/scope of
         context/roles definition
         measurement apparatus
         results/interpretation
         user selection
use limitation, privacy criterion for challenge questions system
USENET newsgroups, patch distribution
user experiences, eBay user profiles
user group meetings, survey/questionnaire data collection/analysis
users
    actions of
         phishing attack defense
     alerting, Bugnosis
     anonymity sets
     attackers and, exploiting differences
     awareness of
         distributed/collaborative applications
         information disclosure
         privacy-protective behaviors
         web security, Bugnosis
     behavior in sociotechnical systems 2nd
         policing, consequences of
         security culture, building
     beliefs/attitudes 2nd
     browsers, hidden information
     children/adolescents
     clustering, interface design approach
     compliance of
     consent indications
     decision-making process
     demands on
         reducing 2nd
     educating
         privacy management
         Shred Trash command
     efforts of, minimizing
     expectations, security operations
     experiences
         biometric authentication and
         on eBay
     feedback in postrelease
     gesture-based configuration
     hard drives, directly addressable data
    identifying
         keystroke digraphs
     in academic environments
     in e-commerce transactions, assessing risks
    information about
         collecting/analyzing with online tools
         concerns about publicizing
         downloading files
         user fine-grained control
     informing through interaction design, web browsers
     knowledge of, web security study
     meaningful actions, system configuration supporting 2nd 3rd
     minimal distraction of
     motivating 2nd
     partnership with
     passwords
         remembering
         written down 2nd
     perceptions of, phishing attacks and
     PKI and
     privacy issues 2nd 3rd 4th
         Bugnosis privacy-analysis tool
         coarse-grained control 2nd
         difficulty articulating 2nd
         information about, providing
         information, supporting flow of
         interviews about
         P3P user agent design
     profiles of 2nd 3rd
     protection, designing systems
     psychological manipulation by interface
     requirements of 2nd
     rules for shredding files
    skills of
         accommodating
         exploiting
         psychological acceptability applied to
     support calls from, analysis of
     system design/development
     system design/development, involving in
     tracking
     training, biometric authentication systems
     trust and
     types of, accommodating all
     understanding of security
     weakest link property 2nd 3rd 4th
     work context, field studies of
     work practices 2nd



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net