<--- Back to Details
First PageDocument Content
Computing / Technology / Humancomputer interaction / Usability / Technical communication / Software / Design / Graphic design / User interface design / User interface / End user / Computer security
Date: 2003-01-17 16:30:14
Computing
Technology
Humancomputer interaction
Usability
Technical communication
Software
Design
Graphic design
User interface design
User interface
End user
Computer security

Three Challenges for Embedding Security into Applications Rebecca E. Grinter and D. K. Smetters Palo Alto Research Center (PARCCoyote Hill Road Palo Alto, CAUSA

Add to Reading List

Source URL: www.andrewpatrick.ca

Download Document from Source Website

File Size: 132,58 KB

Share Document on Facebook

Similar Documents

Increasing Usability of Spin-based C Code Verification Using a Harness Definition Language Leveraging Model-driven Code Checking to Practitioners Daniel Ratiu  Andreas Ulrich

Increasing Usability of Spin-based C Code Verification Using a Harness Definition Language Leveraging Model-driven Code Checking to Practitioners Daniel Ratiu Andreas Ulrich

DocID: 1xVPm - View Document

Why Do Developers Get Password Storage Wrong?  A Qualitative Usability Study

Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study

DocID: 1xUMu - View Document

eCommerce Apps Wir bei ieffects sind davon überzeugt, dass Usability im B2B eCommerce ein entscheidender Erfolgsfaktor ist. Denn die Kunden unserer Kunden möchten ihren Job erledigen und zwar möglichst schnell, einfac

eCommerce Apps Wir bei ieffects sind davon überzeugt, dass Usability im B2B eCommerce ein entscheidender Erfolgsfaktor ist. Denn die Kunden unserer Kunden möchten ihren Job erledigen und zwar möglichst schnell, einfac

DocID: 1xTOZ - View Document

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

DocID: 1xT8l - View Document

PDF Document

DocID: 1xO2C - View Document