|
|
Showing 1 - 4 of
4 matches in All Departments
Most organisations try to protect their systems from unauthorised
access, usually through passwords. Considerable resources are spent
designing secure authentication mechanisms, but the number of
security breaches and problems is still increasing (DeAlvare, 1990;
Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and
resulting theft of information or misuse of the system, is usually
due to hackers "cracking" user passwords, or obtaining them through
social engineering. System security, unlike other fields of system
development, has to date been regarded as an entirely technical
issue - little research has been done on usability or human factors
related to use of security mechanisms. Hitchings (1995) concludes
that this narrow perspective has produced security mechanisms which
are much less effective than they are generally thought to be.
Davis & Price (1987) point out that, since security is
designed, implemented, used and breached by people, human factors
should be considered in the design of security mechanism. It seems
that currently hackers pay more attention to human factors than
security designers do. The technique of social engineering, for
instanc- obtaining passwords by deception and persuasion- exploits
users' lack of security awareness. Hitchings (1995) also suggests
that organisational factors ought to be considered when assessing
security systems. The aim of the study described in this paper was
to identify usability and organisational factors which affect the
use of passwords. The following section provides a brief overview
of authentication systems along with usability and organisational
issues which have been identified to date. 1.
New technologies like AI, medical apps and implants seem very
exciting but they too often have bugs and are susceptible to
cyberattacks. Even well-established technologies like infusion
pumps, pacemakers and radiotherapy aren't immune. Until digital
healthcare improves, digital risk means that patients may be harmed
unnecessarily, and healthcare staff will continue to be blamed for
problems when it's not their fault. This book tells stories of
widespread problems with digital healthcare. The stories inspire
and challenge anyone who wants to make hospitals and healthcare
better. The stories and their resolutions will empower patients,
clinical staff and digital developers to help transform digital
healthcare to make it safer and more effective. This book is not
just about the bugs and cybersecurity threats that affect digital
healthcare. More importantly, it's about the solutions that can
make digital healthcare much safer.
Reading is a complex human activity that has evolved, and
co-evolved, with technology over thousands of years. Mass printing
in the fifteenth century firmly established what we know as the
modern book, with its physical format of covers and paper pages,
and now-standard features such as page numbers, footnotes, and
diagrams. Today, electronic documents are enabling paperless
reading supported by eReading technologies such as Kindles and
Nooks, yet a high proportion of users still opt to print on paper
before reading. This persistent habit of "printing to read" is one
sign of the shortcomings of digital documents -- although the
popularity of eReaders is one sign of the shortcomings of paper.
How do we get the best of both worlds? The physical properties of
paper (for example, it is light, thin, and flexible) contribute to
the ease with which physical documents are manipulated; but these
properties have a completely different set of affordances to their
digital equivalents. Paper can be folded, ripped, or scribbled on
almost subconsciously -- activities that require significant
cognitive attention in their digital form, if they are even
possible. The nearly subliminal interaction that comes from years
of learned behavior with paper has been described as lightweight
interaction, which is achieved when a person actively reads an
article in a way that is so easy and unselfconscious that they are
not apt to remember their actions later. Reading is now in a period
of rapid change, and digital text is fast becoming the predominant
mode of reading. As a society, we are merely at the start of the
journey of designing truly effective tools for handling digital
text. This book investigates the advantages of paper, how the
affordances of paper can be realized in digital form, and what
forms best support lightweight interaction for active reading. To
understand how to design for the future, we review the ways reading
technology and reader behavior have both changed and remained
constant over hundreds of years. We explore the reasoning behind
reader behavior and introduce and evaluate several user interface
designs that implement these lightweight properties familiar from
our everyday use of paper. We start by looking back, reviewing the
development of reading technology and the progress of research on
reading over many years. Drawing key concepts from this review, we
move forward to develop and test methods for creating new and more
effective interactions for supporting digital reading. Finally, we
lay down a set of lightweight attributes which can be used as
evidence-based guidelines to improve the usability of future
digital reading technologies. By the end of this book, then, we
hope you will be equipped to critique the present state of digital
reading, and to better design and evaluate new interaction styles
and technologies.
First published in 1990, this book discusses the application of
formal methods to the human-computer interface. Formal methods -
the attempt to provide methods that rigourously and unambiguously
describe the behaviour of a computer program or system - is
receiving a great deal of attention in human-computer interaction
(HCI). Topics such as the specification of a system, the
construction of a system from its specification and the abstraction
of a specification from an existing system, are clearly of great
theoretical and practical interest. The contributors to the work
are well-known in the field of HCI and their articles cover much of
the work in the area. The book is a series of papers specially
commissioned by the editors for the book; it is thus a coherent and
important contribution to the area.
|
|