Exploring the meaning of usable security–a literature review

M Lennartsson, J Kävrestad… - Information & Computer …, 2021 - emerald.com
Purpose For decades, literature has reported on the perceived conflict between usability and
security. This mutual trade-off needs to be considered and addressed whenever security …

Digital transformation security challenges

H Stewart - Journal of Computer Information Systems, 2023 - Taylor & Francis
Digital transformation has become one of the most popular strategies for information
systems (IS). Developing and implementing a digital strategy is a mandatory task for any …

Emerging NUI-based methods for user authentication: A new taxonomy and survey

N Sae-Bae, J Wu, N Memon, J Konrad… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the convenience and cost benefits of natural user interface (NUI) technologies are
hastening their wide adoption, computing devices equipped with such interfaces are …

Deciding between information security and usability: Developing value based objectives

G Dhillon, T Oliveira, S Susarapu, M Caldeira - Computers in Human …, 2016 - Elsevier
Deciding between security and usability of systems remains an important topic among
managers and academics. One of the fundamental problems is to balance the conflicting …

RECLAIM: Toward a new era of refurbishment and remanufacturing of industrial equipment

A Zacharaki, T Vafeiadis, N Kolokas… - Frontiers in Artificial …, 2021 - frontiersin.org
Refurbishment and remanufacturing are the industrial processes whereby used products or
parts that constitute the product are restored. Remanufacturing is the process of restoring the …

Draw it as shown: Behavioral pattern lock for mobile user authentication

Y Ku, LH Park, S Shin, T Kwon - IEEE Access, 2019 - ieeexplore.ieee.org
Android pattern lock is still popularly used for mobile user authentication. Unfortunately,
however, many concerns have been raised regarding its security and usability. User-created …

Secure user verification and continuous authentication via earphone imu

J Liu, W Song, L Shen, J Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Biometric plays an important role in user authentication. However, the most widely used
biometrics, such as facial feature and fingerprint, are easy to capture or record, and thus …

Bu-Dash: a universal and dynamic graphical password scheme (extended version)

P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023 - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …

" The Same {PIN}, Just Longer": On the ({In) Security} of Upgrading {PINs} from 4 to 6 Digits

CW Munyendo, P Markert, A Nisenoff, M Grant… - 31st USENIX Security …, 2022 - usenix.org
With the goal of improving security, companies like Apple have moved from requiring 4-digit
PINs to 6-digit PINs in contexts like smartphone unlocking. Users with a 4-digit PIN thus …

Permissions snapshots: Assessing users' adaptation to the Android runtime permission model

P Andriotis, MA Sasse… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
The Android operating system changed its security-and privacy-related permission model
recently, offering its users the ability to control resources that applications are allowed to …