Account Security - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Account Security

The Experts below are selected from a list of 624 Experts worldwide ranked by ideXlab platform

Account Security – Free Register to Access Experts & Abstracts

Elissa M. Redmiles – One of the best experts on this subject based on the ideXlab platform.

  • “Should I Worry?” A Cross-Cultural Examination of Account Security Incident Response
    2019 IEEE Symposium on Security and Privacy (SP), 2019
    Co-Authors: Elissa M. Redmiles
    Abstract:

    Digital Security technology is able to identify and prevent many threats to users Accounts. However, some threats remain that, to provide reliable Security, require human intervention: e.g., through users paying attention to warning messages or completing secondary authentication procedures. While prior work has broadly explored people’s mental models of digital Security threats, we know little about users’ precise, in-the-moment response process to in-the-wild threats. In this work, we conduct a series of qualitative interviews (n=67) with users who had recently experienced suspicious login incidents on their real Facebook Accounts in order to explore this process of Account Security incident response. We find a common process across participants from five countries – with differing online and offline cultures – allowing us to identify areas for future technical development to best support user Security. We provide additional insights on the unique nature of incident-response information seeking, known attacker threat models, and lessons learned from a large, cross-cultural qualitative study of digital Security.

  • IEEE Symposium on Security and Privacy – “Should I Worry?” A Cross-Cultural Examination of Account Security Incident Response
    2019 IEEE Symposium on Security and Privacy (SP), 2019
    Co-Authors: Elissa M. Redmiles
    Abstract:

    Digital Security technology is able to identify and prevent many threats to users Accounts. However, some threats remain that, to provide reliable Security, require human intervention: e.g., through users paying attention to warning messages or completing secondary authentication procedures. While prior work has broadly explored people’s mental models of digital Security threats, we know little about users’ precise, in-the-moment response process to in-the-wild threats. In this work, we conduct a series of qualitative interviews (n=67) with users who had recently experienced suspicious login incidents on their real Facebook Accounts in order to explore this process of Account Security incident response. We find a common process across participants from five countries — with differing online and offline cultures — allowing us to identify areas for future technical development to best support user Security. We provide additional insights on the unique nature of incident-response information seeking, known attacker threat models, and lessons learned from a large, cross-cultural qualitative study of digital Security.

Maxi Van Aardt – One of the best experts on this subject based on the ideXlab platform.

  • In search of a more adequate conceptualisation of Security for Southern Africa: do we need a feminist touch?
    Politikon, 1993
    Co-Authors: Maxi Van Aardt
    Abstract:

    ABSTRACT This article explores the conventional conceptualisation of Security from a feminist perspective. Using insights gained from difference feminism and other feminist perspectives, a critique of conventional Security thinking is proposed and a broader, more inclusive approach is suggested which takes into Account Security threats and needs other than those concerned with military‐political issues.

  • In Search of a More Adequate Concept of Security for Southern Africa
    South African Journal of International Affairs, 1993
    Co-Authors: Maxi Van Aardt
    Abstract:

    Abstract This article offers a critique of the conventional concept of Security and a broader, more inclusive approach is suggested. This takes into Account Security threats and needs other than those concerned with (only) military‐political issues. The proposed framework for analysis deals with the various dimensions and levels of Security, with special reference to southern Africa. A number of problems concerning such a broad approach are also discussed It is concluded that regional cooperation on the provision of Security for all the inhabitants offers the only realistic approach to dealing with the mutual needs and threats experienced.

Li Zhou – One of the best experts on this subject based on the ideXlab platform.

  • web service provider selection under qos and Security constraints
    Joint Conferences on Pervasive Computing, 2009
    Co-Authors: Li Zhou
    Abstract:

    In pervasive computing environment, web services are widely adopted in dynamic business processes. When selecting service providers, quality of service (QoS) and Security constraints should be considered simultaneously. However, most current research works about provider selection either focus on quality of service, or just take into Account Security constraints. In this paper, we propose an evaluation model for business process, which considers the above two factors at the same time. Two key criterias are introduced to measure the overall cost and benefit of QoS parameters respectively. Typical Security constraints, such as separation of duty (SoD) constraints and binding of duty (BoD) constraints, are also considered. We define the service provider selection problem and present a linear programming based solution. Some experiments are performed to evaluate our model and the results show that our approach is effective in solving the problem.