Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 62
1.
  • Systematically breaking and... Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
    Sun, San-Tsai; Hawkey, Kirstie; Beznosov, Konstantin Computers & security, June 2012, 2012-6-00, 20120601, Letnik: 31, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-enabled user accounts, and tens of thousands of supporting websites. While the security of the protocol is ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
2.
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
3.
  • Security practitioners in c... Security practitioners in context: Their activities and interactions with other stakeholders within organizations
    Werlinger, Rodrigo; Hawkey, Kirstie; Botta, David ... International journal of human-computer studies, 07/2009, Letnik: 67, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    This study investigates the context of interactions of information technology (IT) security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
4.
  • Heuristics for Evaluating I... Heuristics for Evaluating IT Security Management Tools
    Jaferian, Pooya; Hawkey, Kirstie; Sotirakopoulos, Andreas ... Human-computer interaction, 07/2014, Letnik: 29, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The usability of IT security management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. In this article, we explore how domain specific heuristics are ...
Celotno besedilo
Dostopno za: BFBNIB, DOBA, GIS, IJS, IZUM, KILJ, KISLJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
5.
  • The benefits of more electr... The benefits of more electronic screen space on students’ retention of material in classroom lectures
    Lanir, Joel; Booth, Kellogg S.; Hawkey, Kirstie Computers and education, 09/2010, Letnik: 55, Številka: 2
    Journal Article
    Recenzirano

    Many lecture halls today have two or more screens to be used by instructors for lectures with computer-supported visual aids. Typically, this additional screen real estate is not used to display ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
6.
  • Investigating Users' Perspe... Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
    SUN, San-Tsai; POSPISIL, Eric; MUSLUKHOV, Ildar ... ACM transactions on Internet technology, 11/2013, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano

    OpenID and OAuth are open and simple Web SSO protocols that have been adopted by major service providers, and millions of supporting Web sites. However, the average user’s perception of Web SSO is ...
Celotno besedilo
Dostopno za: NUK, UL
7.
  • Exploring Privacy Notificat... Exploring Privacy Notification and Control Mechanisms for Proximity-Aware Tablets
    Zhou, Huiyuan; Ferreira, Vinicius; Alves, Thamara Silva ... International journal of mobile human computer interaction, 07/2015, Letnik: 7, Številka: 3
    Journal Article
    Recenzirano

    In hospitals, offices and other settings, professionals face the challenge of accessing and sharing sensitive content in public areas. As tablets become increasingly adopted in work environments, it ...
Celotno besedilo
Dostopno za: NUK, UL
8.
  • Toward understanding distri... Toward understanding distributed cognition in IT security management: the role of cues and norms
    Botta, David; Muldner, Kasia; Hawkey, Kirstie ... Cognition, technology & work, 06/2011, Letnik: 13, Številka: 2
    Journal Article
    Recenzirano

    Information technology security management (ITSM) entails significant challenges, including the distribution of tasks and stakeholders across the organization, the need for security practitioners to ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, ODKLJ, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
9.
Celotno besedilo
Dostopno za: NUK, UL
10.
  • Investigating Usersa Perspe... Investigating Usersa Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
    Sun, San-Tsai; Pospisil, Eric; Muslukhov, Ildar ... ACM transactions on Internet technology, 11/2013, Letnik: 13, Številka: 1
    Journal Article
    Recenzirano

    OpenID and OAuth are open and simple Web SSO protocols that have been adopted by major service providers, and millions of supporting Web sites. However, the average useras perception of Web SSO is ...
Celotno besedilo
Dostopno za: NUK, UL
1 2 3 4 5
zadetkov: 62

Nalaganje filtrov