000 -LEADER |
fixed length control field |
05614nam a2200697 i 4500 |
001 - CONTROL NUMBER |
control field |
6920435 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
IEEE |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20200413152915.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m eo d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr cn |||m|||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
141016s2014 caua foab 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781627055307 |
Qualifying information |
ebook |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
9781627055291 |
Qualifying information |
print |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.2200/S00594ED1V01Y201408SPT011 |
Source of number or code |
doi |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(CaBNVSL)swl00404118 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)893101704 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CaBNVSL |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
CaBNVSL |
Modifying agency |
CaBNVSL |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
G278 2014 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN) |
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) |
|
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) |
MoCl |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Garfinkel, Simson., |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Usable security : |
Remainder of title |
history, themes, and challenges / |
Statement of responsibility, etc. |
Simson Garfinkel, Heather Richter Lipford. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : |
Name of producer, publisher, distributor, manufacturer |
Morgan & Claypool, |
Date of production, publication, distribution, manufacture, or copyright notice |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 PDF (xiv, 150 pages) : |
Other physical details |
illustrations. |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
electronic |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Synthesis lectures on information security, privacy, and trust, |
International Standard Serial Number |
1945-9750 ; |
Volume/sequential designation |
# 11 |
538 ## - SYSTEM DETAILS NOTE |
System details note |
Mode of access: World Wide Web. |
538 ## - SYSTEM DETAILS NOTE |
System details note |
System requirements: Adobe Acrobat Reader. |
500 ## - GENERAL NOTE |
General note |
Part of: Synthesis digital library of engineering and computer science. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 109-147). |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
1. Introduction -- 1.1 Why usable privacy and security is hard -- 1.2 Why usable security research is hard -- 1.3 This book -- 1.4 Methodology -- 1.5 Scope -- 1.6 Definitions -- 1.6.1 Security -- 1.6.2 Usability -- 1.6.3 Privacy -- 1.7 Related surveys and studies -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
2. A brief history of usable privacy and security research -- 2.1 Early work (1975-1995) -- 2.2 The birth of UPS (1995-2000) -- 2.3 Creation of the UPS research community (2000-2005) -- 2.4 Mechanical Turk -- 2.5 Current UPS publishing venues -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
3. Major themes in UPS academic research -- 3.1 User authentication -- 3.1.1 Text passwords -- 3.1.2 Password managers -- 3.1.3 Graphical authentication -- 3.1.4 Biometrics -- 3.1.5 Token-based authentication -- 3.1.6 Mental computation and one-time passwords -- 3.1.7 CAPTCHAs -- 3.1.8 Fallback and backup authentication -- 3.2 Email security and PKI -- 3.2.1 Automatic, transparent encryption -- 3.2.2 Future of secure messaging -- 3.3 Anti-phishing efforts -- 3.3.1 A brief history of phishing -- 3.3.2 Passive security indicators -- 3.3.3 Active security warnings -- 3.3.4 Training -- 3.3.5 Password managers -- 3.4 Storage -- 3.5 Device pairing -- 3.6 Web privacy and fair information practice -- 3.6.1 Privacy policies -- 3.6.2 P3P -- 3.6.3 Behavioral advertising -- 3.6.4 Summary -- 3.7 Policy specification and interaction -- 3.8 Mobile security and privacy -- 3.8.1 Location privacy -- 3.8.2 Application platforms -- 3.8.3 Mobile authentication -- 3.9 Social media privacy -- 3.10 Security administrators -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
4. Lessons learned -- 4.1 Reduce decisions -- 4.2 Safe and secure defaults -- 4.3 Provide users with better information, not more information -- 4.4 Users require clear context to make good decisions -- 4.5 Information presentation is critical -- 4.6 Education works, but has limits -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
5. Research challenges -- 5.1 Subject challenge: authentication -- 5.2 Subject challenge: adversary modeling -- 5.3 Subject challenge: administrators and system administration -- 5.4 Subject challenge: consumer privacy -- 5.5 Subject challenge: social computing -- 5.6 Domain challenge: ecological validity -- 5.7 Domain challenge: teaching -- |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
6. Conclusion: the next ten years -- Bibliography -- Authors' biographies. |
506 1# - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Abstract freely available; full-text restricted to subscribers or individual document purchasers. |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Compendex |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
INSPEC |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google scholar |
510 0# - CITATION/REFERENCES NOTE |
Name of source |
Google book search |
520 3# - SUMMARY, ETC. |
Summary, etc. |
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as "usable security." Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research. |
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE |
Additional physical form available note |
Also available in print. |
588 ## - SOURCE OF DESCRIPTION NOTE |
Source of description note |
Title from PDF title page (viewed on October 16, 2014). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection. |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
usable privacy and security |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
passwords |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
device pairing |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
privacy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
authentication |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
privacy policies |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Lipford, Heather Richter., |
Relator term |
author. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Print version: |
International Standard Book Number |
9781627055291 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis digital library of engineering and computer science. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Synthesis lectures on information security, privacy, and trust ; |
Volume/sequential designation |
# 11. |
International Standard Serial Number |
1945-9750 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to full text |
Uniform Resource Identifier |
http://dx.doi.org/10.2200/S00594ED1V01Y201408SPT011 |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Abstract with links to resource |
Uniform Resource Identifier |
http://ieeexplore.ieee.org/servlet/opac?bknumber=6920435 |