The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security. One mechanism for ensuring the integrity and confidentiality of information is encryption software. Unfortunately, software usability issues can hinder an end-user’s capability to properly utilise the security features effectively. To date there has been little research in investigating the usability of encryption software and proposing solutions for improving them. This research paper analysed the usability of encryption software targeting end-users. The research identified several issues that could impede the ability of a novice end-user to adequately utilise the encryption software. A set of pro...
Computer security has traditionally been assessed from a technical point of view. In this paper, we ...
Usable security assumes that when security functions are more usable, people are more likely to use ...
A good portion of today\u27s investigations include, at least in part, an examination of the user\u2...
One of the key challenges in the development of secure software is the tradeoff between usability an...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Advancement in technology dictates that information security, user data integrity and security be pa...
It is common for end-users to have difficulty in using computer or network security appropriately an...
This paper describes the unique challenges facing usable security research and design, and introduce...
Computer security has traditionally been assessed from a technical point of view. Another way to ass...
Network security ensures that essential and accessible network assets are protected from viruses, ke...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
With all security technologies available to use and benefit from, computer users might wonder why th...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Computer security has traditionally been assessed from a technical point of view. In this paper, we ...
Usable security assumes that when security functions are more usable, people are more likely to use ...
A good portion of today\u27s investigations include, at least in part, an examination of the user\u2...
One of the key challenges in the development of secure software is the tradeoff between usability an...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Advancement in technology dictates that information security, user data integrity and security be pa...
It is common for end-users to have difficulty in using computer or network security appropriately an...
This paper describes the unique challenges facing usable security research and design, and introduce...
Computer security has traditionally been assessed from a technical point of view. Another way to ass...
Network security ensures that essential and accessible network assets are protected from viruses, ke...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
With all security technologies available to use and benefit from, computer users might wonder why th...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Computer security has traditionally been assessed from a technical point of view. In this paper, we ...
Usable security assumes that when security functions are more usable, people are more likely to use ...
A good portion of today\u27s investigations include, at least in part, an examination of the user\u2...