Sciweavers

38 search results - page 2 / 8
» The Psychology of Security
Sort
View
CHI
2009
ACM
14 years 5 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
AGENTS
1999
Springer
13 years 9 months ago
Where to Look? Automating Attending Behaviors of Virtual Human Characters
This research proposes a computational framework for generating visual attending behavior in an embodied simulated human agent. Such behaviors directly control eye and head motion...
Sonu Chopra-Khullar, Norman I. Badler
TRUST
2010
Springer
13 years 10 months ago
Axiomatic and Behavioural Trust
Academic discourse on trust is fractured along disciplinary lines. Security theorists routinely use a definition of trust which, apparently, has little in common with any of the d...
Clark D. Thomborson
CORR
2010
Springer
352views Education» more  CORR 2010»
13 years 4 months ago
Case Study On Social Engineering Techniques for Persuasion
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working prin...
Mosin Hasan, Nilesh Prajapati, Safvan Vohara
NSPW
2004
ACM
13 years 10 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...