Security in the wild: user strategies for managing security as an everyday, practical problem

    Personal and Ubiquitous Computing, pp. 391-401, 2004.

    Cited by: 344|Bibtex|Views13|Links
    EI
    Keywords:
    Access Control Ubiquitous Computing Security Management Email Message Security Technology

    Abstract:

    Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving this problem, we have been examining how p...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments