Considering that many organizations today are extremely dependent on information technology, computer and information security (CIS) has become a critical concern from a business viewpoint. CIS is concerned with protecting the confidentiality, integrity, accessible information, when using computer systems. Much research has been conducted on CIS in the past years. However, the attention has been primarily focused on technical problems and solutions. Only recently, the role of human factors in CIS has been recognized. End-user behavior can increase the vulnerability of computer and information systems. In this study, using a large questionnaire survey among endusers, we examine password behavior of end-users.
It has been argued that too much research on usability engineering is incoherent with the processes, and settings being the realities for practitioners. In this paper we want to extend the existing knowledge about usability engineering in the wild. Through 12 semi-structured interviews we wanted to get an understanding of how usability is perceived, and practiced in reality. We found that our participants primarily focus on upfront work to support the design, and implementation process. They implement usability engineering through informal evaluations, and by following a set of local de facto standards. We want to extend the existing body of knowledge about usability engineering in practice, to support the development of methods aimed at practitioners.
Considering that many organizations today are extremely dependent on information technology, computer and information security (CIS) has become a critical concern from a business viewpoint. CIS is concerned with protecting the confidentiality, integrity, accessible information, when using computer systems. Much research has been conducted on CIS in the past years. However, the attention has been primarily focused on technical problems and solutions. Only recently, the role of human factors in CIS has been recognized. End-user behavior can increase the vulnerability of computer and information systems. In this study, using a large questionnaire survey among endusers, we examine password behavior of end-users.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.