Threats or threads: from usable security to secure experience?
Niels Raabjerg MathiasenSusanne BødkerPublished in: NordiCHI (2008)
Keyphrases
- security measures
- security issues
- security services
- information security
- security mechanisms
- security threats
- countermeasures
- security management
- security requirements
- security level
- security protocols
- computer security
- intrusion detection system
- security policies
- security problems
- sensitive data
- cyber attacks
- key management
- security breaches
- cryptographic protocols
- access control
- data encryption
- cyber security
- security architecture
- security analysis
- integrity verification
- security patterns
- intrusion detection
- digital rights management
- security vulnerabilities
- electronic voting
- sql injection
- user authentication
- secure communication
- security properties
- national security
- personal information
- smart card
- security risks
- data security
- resource constrained
- stream cipher
- network security
- insider attacks
- operating system
- cloud computing