[go: up one dir, main page]

Abraham et al., 2021 - Google Patents

“I'm Doing the Best I Can.” Understanding Technology Literate Older Adults' Account Management Strategies

Abraham et al., 2021

View PDF
Document ID
15241339497471147279
Author
Abraham M
Crabb M
Radomirović S
Publication year
Publication venue
International Workshop on Socio-Technical Aspects in Security

External Links

Snippet

Older adults are becoming more technologically proficient and use the internet to participate actively in society. However, current best security practices can be seen as unusable by this population group as these practices do not consider the needs of an older adult. Aim. We …
Continue reading at discovery.dundee.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer

Similar Documents

Publication Publication Date Title
Baraković et al. Cyber hygiene knowledge, awareness, and behavioral practices of university students
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Creese et al. Relationships between password choices, perceptions of risk and security expertise
Albayram et al. Comparing the effectiveness of text-based and video-based delivery in motivating users to adopt a password manager
Hassanzadeh et al. User perception of data breaches
Claar The adoption of computer security: An analysis of home personal computer user behavior using the health belief model
Ray et al. “Warn them” or “just block them”?: investigating privacy concerns among older and working age adults
Farcasin et al. Why we hate IT: two surveys on pre‐generated and expiring passwords in an academic setting
Renaud et al. Guidelines for ethical nudging in password authentication
Al Qahtani et al. Do women in conservative societies (not) follow smartphone security advice? a case study of saudi arabia and pakistan
Kocabas et al. Understanding user’s behavior and protection strategy upon losing, or identifying unauthorized access to online account
Höltervennhoff et al. A {Mixed-Methods} Study on User Experiences and Challenges of Recovery Codes for an {End-to-End} Encrypted Service
Mayer et al. On the systematic development and evaluation of password security awareness-raising materials
Abraham et al. “I’m Doing the Best I Can.” Understanding Technology Literate Older Adults’ Account Management Strategies
Antipova et al. Managing cyber resilience literacy for consumers
Chitare et al. “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations
Kuraku Curiosity Clicks: The Need for Security Awareness
Ozkaya Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition)
Abu-Salma Designing user-centered privacy-enhancing technologies
Biese et al. “Cross Your Fingers and Hope You Don’t Get Hacked”: A Qualitative Study on The Psychological Factors Behind Non-Compliance with Cybersecurity Recommendations
Dorasamy et al. Cybersecurity issues among working youths in an iot environment: A design thinking process for solution
Bhate A Study on awareness about cyber security among the female university students
Amft On the usability of authentication security communication
Perova Creating guidelines and best practices against phishing and ransomware attacks for healthcare personnel
Pearson III The effects of inhibitory control and perceptual attention on cyber security