security

2 Mar 2011 - 12:16pm
0
3 years ago
5 replies
Terms:
Don Habas
2008

"Login" using Name, DOB and SSN

Scenario :

User is filling out a long application for a financial product.  At first, they were going to have the ability to create and ID and password, so they can come back and continue at a later time.  However, due to scope reduction, they were suggesting the option of having the user log in to continue using their name, date of birth, and SSN.  

Not going to be enough time for testing (except for walking around the office to get feedback).

How do you think applicants would feel about this?

23 Nov 2010 - 10:24pm
0
interactive fiction
2010
pooyaj
2010

Research participants with familiarity with Heuristic Evaluation needed

LERSSE (Laboratory for Education and Research in Secure Systems Engineering) at the University of British Columbia is conducting a research project to evaluate the use of heuristic evaluation for usability evaluation of IT security management tools. This research requires volunteers with familiarity with heuristic evaluation to perform heuristic evaluation on an IT security management tool. You will need to participate either in person or remotely in a 4 hour session.

1 Oct 2010 - 5:43am
0
4 years ago
4 replies
Andreas Absér
2007

What's best practice regarding style guides/prototypes/HMI guidelines/process for huge systems in huge corporations?

Let's say (hypothetically) you're working as an HFE-specialist for a major corporation developing huge situational awareness/command and control systems for many countries. The process for HFE/ID/UX is substandard and the interfaces are often put together by the programmers. 

Now what if you could decide how everything will work instead?  What would you do, what standards would you have the company adhere to? What would the processes you design look like? What key documents would be produced?

OK, big question. But where to start?

11 May 2010 - 1:41pm
0
4 years ago
1 reply
Karl Herler
2010

Mikkel Michelsen: Mission-Critical Interaction Design

This short presentation provides an introduction to the exciting world of mission critical interaction design, where safety, security and protecting human life enters the realm of digital technology.
In mission critical solutions, user requirements are extreme – the physical conditions are often difficult and stress levels are high.
5 Jan 2010 - 6:49pm
0
4 years ago
5 replies
Devin A. Brown8
2010

User cookie authentication vs. Security

Hi,

I work for a very well-known publishing / corporate site that
attracts a high number of C-level global visitors. Our Security IT
department has has asked us to change our login procedures to
auto-log out user after 30 minutes (like a bank) as opposed to never
auto-expiring a login authentication cookie.

8 Nov 2009 - 9:34pm
0
Siegy Adler
2009

Two-factor Authentication and Biometrics

Hi,

Out of curiosity, has anybody implemented two-factor authentication
using biometrics (e.g., fingerprint, voice, etc.) as the second
factor?

Thanks!

25 Sep 2009 - 2:27am
0
5 years ago
8 replies
Arjan Haring
2003

Input needed for courses in Design for Security

My first question on this platform. Well here it goes:

I am restructuring my Experience Design courses for 1st and 2nd year
bachelor students of Security Technology and I would really
appreciate your input. I've already renamed the course "Design for
Security", because it seems to convey the goal of the course
better.

So I want to use methods en techniques from the design discipline to
create more secure/safe environments. Information security is not
what the program is focused on.

15 Apr 2009 - 1:22pm
0
5 years ago
19 replies
Alan Cox
2009

Password Strength Requirements

Does anyone have any evidence, anecdotal or formal, about how
different password strength requirements impact the usability of a
web-based application?

There's a spectrum of different strength requirements. I've seen
sites that don't have any requirements, other than the password
exists.

Syndicate content Get the feed