Usable Security (Record no. 85103)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02913nam a22004935i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-02343-9 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730163909.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220601s2014 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031023439 |
-- | 978-3-031-02343-9 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
100 1# - AUTHOR NAME | |
Author | Garfinkel, Simson. |
245 10 - TITLE STATEMENT | |
Title | Usable Security |
Sub Title | History, Themes, and Challenges / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2014. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIV, 150 p. |
490 1# - SERIES STATEMENT | |
Series statement | Synthesis Lectures on Information Security, Privacy, and Trust, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Acknowledgments -- Figure Credits -- Introduction -- A Brief History of Usable Privacy and Security Research -- Major Themes in UPS Academic Research -- Lessons Learned -- Research Challenges -- Conclusion: The Next Ten Years -- Bibliography -- Authors' Biographies . |
520 ## - SUMMARY, ETC. | |
Summary, etc | There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research. |
700 1# - AUTHOR 2 | |
Author 2 | Richter Lipford, Heather. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-02343-9 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2014. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1945-9750 |
912 ## - | |
-- | ZDB-2-SXSC |
No items available.