Supporting Users in Password Authentication with Persuasive Design


Book Description

Activities like text-editing, watching movies, or managing personal finances are all accomplished with web-based solutions nowadays. The providers need to ensure security and privacy of user data. To that end, passwords are still the most common authentication method on the web. They are inexpensive and easy to implement. Users are largely accustomed to this kind of authentication but passwords represent a considerable nuisance, because they are tedious to create, remember, and maintain. In many cases, usability issues turn into security problems, because users try to work around the challenges and create easily predictable credentials. Often, they reuse their passwords for many purposes, which aggravates the risk of identity theft. There have been numerous attempts to remove the root of the problem and replace passwords, e.g., through biometrics. However, no other authentication strategy can fully replace them, so passwords will probably stay a go-to authentication method for the foreseeable future. Researchers and practitioners have thus aimed to improve users' situation in various ways. There are two main lines of research on helping users create both usable and secure passwords. On the one hand, password policies have a notable impact on password practices, because they enforce certain characteristics. However, enforcement reduces users' autonomy and often causes frustration if the requirements are poorly communicated or overly complex. On the other hand, user-centered designs have been proposed: Assistance and persuasion are typically more user-friendly but their influence is often limited. In this thesis, we explore potential reasons for the inefficacy of certain persuasion strategies. From the gained knowledge, we derive novel persuasive design elements to support users in password authentication. The exploration of contextual factors in password practices is based on four projects that reveal both psychological aspects and real-world constraints. Here, we investigate how mental models of password strength and password managers can provide important pointers towards the design of persuasive interventions. Moreover, the associations between personality traits and password practices are evaluated in three user studies. A meticulous audit of real-world password policies shows the constraints for selection and reuse practices. Based on the review of context factors, we then extend the design space of persuasive password support with three projects. We first depict the explicit and implicit user needs in password support. Second, we craft and evaluate a choice architecture that illustrates how a phenomenon from marketing psychology can provide new insights into the design of nudging strategies. Third, we tried to empower users to create memorable passwords with emojis. The results show the challenges and potentials of emoji-passwords on different platforms. Finally, the thesis presents a framework for the persuasive design of password support. It aims to structure the required activities during the entire process. This enables researchers and practitioners to craft novel systems that go beyond traditional paradigms, which is illustrated by a design exercise.




Interaction Design


Book Description

A new edition of the #1 text in the human computer Interaction field! Hugely popular with students and professionals alike, the Fifth Edition of Interaction Design is an ideal resource for learning the interdisciplinary skills needed for interaction design, human-computer interaction, information design, web design, and ubiquitous computing. New to the fifth edition: a chapter on data at scale, which covers developments in the emerging fields of 'human data interaction' and data analytics. The chapter demonstrates the many ways organizations manipulate, analyze, and act upon the masses of data being collected with regards to human digital and physical behaviors, the environment, and society at large. Revised and updated throughout, this edition offers a cross-disciplinary, practical, and process-oriented, state-of-the-art introduction to the field, showing not just what principles ought to apply to interaction design, but crucially how they can be applied. Explains how to use design and evaluation techniques for developing successful interactive technologies Demonstrates, through many examples, the cognitive, social and affective issues that underpin the design of these technologies Provides thought-provoking design dilemmas and interviews with expert designers and researchers Uses a strong pedagogical format to foster understanding and enjoyment An accompanying website contains extensive additional teaching and learning material including slides for each chapter, comments on chapter activities, and a number of in-depth case studies written by researchers and designers.




Designing and Programming CICS Applications


Book Description

CICS is an application server that delivers industrial-strength, online transaction management for critical enterprise applications. Proven in the market for over 30 years with many of the world's leading businesses, CICS enables today's customers to modernize and extend their applications to take advantage of the opportunities provided by e-business while maximizing the benefits of their existing investments.Designing and Programming CICS Applications will benefit a diverse audience. It introduces new users of IBM's mainframe (OS/390) to CICS features. It shows experienced users how to integrate existing mainframe systems with newer technologies, including the Web, CORBA, Java, CICS clients, and Visual Basic; as well as how to link MQSeries and CICS.Each part of Designing and Programming CICS Applications addresses the design requirements for specific components and gives a step-by-step approach to developing a simple application. The book reviews the basic concepts of a business application and the way CICS meets these requirements. It then covers a wide range of application development technologies, including VisualAge for Java, WebSphere Studio, and Visual Basic. Users learn not only how to design and write their programs but also how to deploy their applications.Designing and Programming CICS Applications shows how to: Develop and modify existing COBOL applications Become familiar with the CICS Java environment and write a simple Java wrapper for a COBOL application Develop a web front end using servlets, JSP and JavaBeans. Link the web front end to an existing COBOL application using CORBA Write a Visual Basic application to develop a customer GUI Link an existing COBOL application using a CICS Client ECI call Develop a Java application using Swing as an MQSeries Client Use the MQSeries-CICS bridge to access an existing COBOL application Whether for working with thousands of terminals or for a client/server environment with workstations and LANs exploiting modern technology such as graphical interfaces or multimedia, Designing and Programming CICS Applications delivers the power to create, modernize and extend CICS applications.




Windows Server 2008 Inside Out


Book Description

Learn how to conquer Windows Server 2008—from the inside out! Designed for system administrators, this definitive resource features hundreds of timesaving solutions, expert insights, troubleshooting tips, and workarounds for administering Windows Server 2008—all in concise, fast-answer format. You will learn how to perform upgrades and migrations, automate deployments, implement security features, manage software updates and patches, administer users and accounts, manage Active Directory directory services, and more. With INSIDE OUT, you’ll discover the best and fastest ways to perform core administrative tasks, with an award-winning format that makes it easy to find exactly the tips, troubleshooting solutions, and workarounds you need. Plus, the companion CD comes packed with a fully searchable eBook and more than 100 timesaving tools and scripts. With INSIDE OUT, you get all muscle and no fluff! For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.




ICCWS 2016 11th International Conference on Cyber Warfare and Security


Book Description

The 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016) is being held at Boston University, Boston, USA on the 17-18th March 2016. The Conference Chair is Dr Tanya Zlateva and the Programme Chair is Professor Virginia Greiman, both from Boston University. ICCWS is a recognised Cyber Security event on the International research conferences calendar and provides a valuable platform for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyber Warfare and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experiences of using the varied and expanding range of Cyberwar and Cyber Security research available to them. The keynote speakers for the conference are Daryl Haegley from the Department of Defense (DoD), who will address the topic Control Systems Networks...What's in Your Building? and Neal Ziring from the National Security Agency who will be providing some insight to the issue of Is Security Achievable? A Practical Perspective. ICCWS received 125 abstract submissions this year. After the double blind, peer review process there are 43 Academic Research Papers 8 PhD papers Research papers, 7 Masters and 1 work-in-progress papers published in these Conference Proceedings. These papers represent work from around the world, including: Australia, Canada, China, Czech Republic, District of Columbia, Finland, France, Israel, Japan, Lebanon, Netherlands, Pakistan, Russian Federation, Saudi Arabia, South Africa, Turkey, United Arab Emirates, UK, USA.




GCSE Computer Science for OCR Student Book


Book Description

A new series of bespoke, full-coverage resources developed for the 2016 AQA and OCR GCSE Computer Science qualifications. Written for the OCR GCSE Computer Science specification for first teaching from 2016, this print Student Book uses an exciting and engaging approach to help students build their knowledge and master underlying computing principles and concepts. Designed to develop computational thinking, programming and problem-solving skills, this resource includes challenges that build on learning objectives, and real-life examples that demonstrate how computer science relates to everyday life. Remember features act as revision references for students and key mathematical skills relevant to computer science are highlighted throughout. A digital Cambridge Elevate-enhanced Edition and a free digital Teacher's Resource are also available.




Web, Graphics & Perl/Tk Programming


Book Description

This volume covers topics not covered in O'Reilly's other Perl books. Half of the articles in this volume deal with essential issues faced by Web developers using Perl.




Advances in Cryptology - CRYPTO 2001


Book Description

Crypto 2001, the 21st Annual Crypto conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 156 submissions, of which the program committee selected 34 for presentation; one was later withdrawn. These proceedings contain the revised versions of the 33 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program included two invited lectures. Mark Sherwin spoke on, \Quantum information processing in semiconductors: an experimentalist’s view." Daniel Weitzner spoke on, \Privacy, Authentication & Identity: A recent history of cryptographic struggles for freedom." The conference program also included its perennial \rump session," chaired by Stuart Haber, featuring short, informal talks on late{breaking research news. As I try to account for the hours of my life that ?ew o to oblivion, I realize that most of my time was spent cajoling talented innocents into spending even more time on my behalf. I have accumulated more debts than I can ever hope to repay. As mere statements of thanks are certainly insu cient, consider the rest of this preface my version of Chapter 11.




Exam Ref 70-413 Designing and Implementing a Server Infrastructure (MCSE)


Book Description

Fully updated! Prepare for Microsoft Exam 70-413 - and help demonstrate your real-world mastery designing, and implementing Windows Server infrastructure in an enterprise environment. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level. Focus on the expertise measured by these objectives: Plan and deploy a server infrastructure Design and implement network infrastructure services Design and implement network access services Design and implement an Active Directory infrastructure (logical) Design and implement an Active Directory infrastructure (physical) This Microsoft Exam Ref: Is fully updated for Windows Server 2012 R2 Organizes its coverage by objectives for Exam 70-413 Features strategic, what-if scenarios to challenge candidates Designed for IT professionals responsible for designing, implementing, and maintaining a Windows Server 2012 infrastructure in an enterprise-scaled, highly virtualized environment.




I Am Error


Book Description

The complex material histories of the Nintendo Entertainment System platform, from code to silicon, focusing on its technical constraints and its expressive affordances. In the 1987 Nintendo Entertainment System videogame Zelda II: The Adventure of Link, a character famously declared: I AM ERROR. Puzzled players assumed that this cryptic mesage was a programming flaw, but it was actually a clumsy Japanese-English translation of “My Name is Error,” a benign programmer's joke. In I AM ERROR Nathan Altice explores the complex material histories of the Nintendo Entertainment System (and its Japanese predecessor, the Family Computer), offering a detailed analysis of its programming and engineering, its expressive affordances, and its cultural significance. Nintendo games were rife with mistranslated texts, but, as Altice explains, Nintendo's translation challenges were not just linguistic but also material, with consequences beyond simple misinterpretation. Emphasizing the technical and material evolution of Nintendo's first cartridge-based platform, Altice describes the development of the Family Computer (or Famicom) and its computational architecture; the “translation” problems faced while adapting the Famicom for the U.S. videogame market as the redesigned Entertainment System; Nintendo's breakthrough console title Super Mario Bros. and its remarkable software innovations; the introduction of Nintendo's short-lived proprietary disk format and the design repercussions on The Legend of Zelda; Nintendo's efforts to extend their console's lifespan through cartridge augmentations; the Famicom's Audio Processing Unit (APU) and its importance for the chiptunes genre; and the emergence of software emulators and the new kinds of play they enabled.