Abraham et al., 2021 - Google Patents
“I'm Doing the Best I Can.” Understanding Technology Literate Older Adults' Account Management StrategiesAbraham et al., 2021
View PDF- Document ID
- 15241339497471147279
- Author
- Abraham M
- Crabb M
- Radomirović S
- Publication year
- Publication venue
- International Workshop on Socio-Technical Aspects in Security
External Links
Snippet
Older adults are becoming more technologically proficient and use the internet to participate actively in society. However, current best security practices can be seen as unusable by this population group as these practices do not consider the needs of an older adult. Aim. We …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baraković et al. | Cyber hygiene knowledge, awareness, and behavioral practices of university students | |
Das | A risk-reduction-based incentivization model for human-centered multi-factor authentication | |
Creese et al. | Relationships between password choices, perceptions of risk and security expertise | |
Albayram et al. | Comparing the effectiveness of text-based and video-based delivery in motivating users to adopt a password manager | |
Hassanzadeh et al. | User perception of data breaches | |
Claar | The adoption of computer security: An analysis of home personal computer user behavior using the health belief model | |
Ray et al. | “Warn them” or “just block them”?: investigating privacy concerns among older and working age adults | |
Farcasin et al. | Why we hate IT: two surveys on pre‐generated and expiring passwords in an academic setting | |
Renaud et al. | Guidelines for ethical nudging in password authentication | |
Al Qahtani et al. | Do women in conservative societies (not) follow smartphone security advice? a case study of saudi arabia and pakistan | |
Kocabas et al. | Understanding user’s behavior and protection strategy upon losing, or identifying unauthorized access to online account | |
Höltervennhoff et al. | A {Mixed-Methods} Study on User Experiences and Challenges of Recovery Codes for an {End-to-End} Encrypted Service | |
Mayer et al. | On the systematic development and evaluation of password security awareness-raising materials | |
Abraham et al. | “I’m Doing the Best I Can.” Understanding Technology Literate Older Adults’ Account Management Strategies | |
Antipova et al. | Managing cyber resilience literacy for consumers | |
Chitare et al. | “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations | |
Kuraku | Curiosity Clicks: The Need for Security Awareness | |
Ozkaya | Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition) | |
Abu-Salma | Designing user-centered privacy-enhancing technologies | |
Biese et al. | “Cross Your Fingers and Hope You Don’t Get Hacked”: A Qualitative Study on The Psychological Factors Behind Non-Compliance with Cybersecurity Recommendations | |
Dorasamy et al. | Cybersecurity issues among working youths in an iot environment: A design thinking process for solution | |
Bhate | A Study on awareness about cyber security among the female university students | |
Amft | On the usability of authentication security communication | |
Perova | Creating guidelines and best practices against phishing and ransomware attacks for healthcare personnel | |
Pearson III | The effects of inhibitory control and perceptual attention on cyber security |