2005
DOI: 10.1007/s00779-005-0347-6
|View full text |Cite
|
Sign up to set email alerts
|

The trouble with login: on usability and computer security in ubiquitous computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(33 citation statements)
references
References 16 publications
0
33
0
Order By: Relevance
“…Additionally, enhancement of the certification using biometrics including fingerprint and iris was also conducted, though at a low rate. Bardram [1] reported that user identification (user name and password) is a basic theme in computer security and is particularly important in the multiuser computer environment. However, the results of the present study revealed that the hospitals of approximately 40% of the nurses who were using a password were not making efforts for password renewal.…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, enhancement of the certification using biometrics including fingerprint and iris was also conducted, though at a low rate. Bardram [1] reported that user identification (user name and password) is a basic theme in computer security and is particularly important in the multiuser computer environment. However, the results of the present study revealed that the hospitals of approximately 40% of the nurses who were using a password were not making efforts for password renewal.…”
Section: Discussionmentioning
confidence: 99%
“…Bardram (2005) discussed proximity-based user authentication allowing access to computers when approached by a person. The system is implemented through authentication tokens (e.g., pens) that wirelessly authorize the access of a person once in close proximity to the computer (i.e., the person stands in front of it).…”
Section: Proximity-dependent Authenticationmentioning
confidence: 99%
“…Other works justify the importance of contextual factors in systems' security in both ATM [16] and hospital authentication solutions [7]. STEAL also integrates context and its interactions in the security analysis.…”
Section: Related Workmentioning
confidence: 99%
“…education) dependent [5,6]. For example, in hospitals, access control solutions cannot be effective unless designed to fit the nomadic, interrupted, and cooperative nature of the medical work [7]. But, the same access control solutions would be judged differently in a context such as a bank, where employees work mostly alone and where security requirements must consider, for example, threats coming from hackers (e.g., see [8]).…”
Section: Introductionmentioning
confidence: 99%