000 | 02913nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-3-031-02343-9 | ||
003 | DE-He213 | ||
005 | 20240730163909.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2014 sz | s |||| 0|eng d | ||
020 |
_a9783031023439 _9978-3-031-02343-9 |
||
024 | 7 |
_a10.1007/978-3-031-02343-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aGarfinkel, Simson. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981092 |
|
245 | 1 | 0 |
_aUsable Security _h[electronic resource] : _bHistory, Themes, and Challenges / _cby Simson Garfinkel, Heather Richter Lipford. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXIV, 150 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aAcknowledgments -- Figure Credits -- Introduction -- A Brief History of Usable Privacy and Security Research -- Major Themes in UPS Academic Research -- Lessons Learned -- Research Challenges -- Conclusion: The Next Ten Years -- Bibliography -- Authors' Biographies . | |
520 | _aThere has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aRichter Lipford, Heather. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981093 |
|
710 | 2 |
_aSpringerLink (Online service) _981094 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012150 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034718 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981095 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02343-9 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85103 _d85103 |