How do you make information security user friendly?
Information Security Technical Report, ISSN: 1363-4127, Vol: 14, Issue: 4, Page: 213-216
2009
- 2Citations
- 775Usage
- 35Captures
Metric Options: Counts1 Year3 YearSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Citations2
- Citation Indexes2
- CrossRef2
- Usage775
- Downloads708
- Abstract Views67
- Captures35
- Readers35
- 35
Article Description
Several methods that are employed to make the information security user friendly are discussed. One approach that might improve the way users perceive information security would be to reverse the current trend of obfuscating the processes on the computer and make the security processes more visible to them. Very few users ever read the end user license agreements or terms and conditions for the software and services that they use and will automatically click the accept button or tick the accept box. The attitude of the users has developed as a result of poor software construction and the presentation of many meaningless or unintelligible messages being presented to the user. The security staff and software developers have to seek assistance from psychologists and normal users to ensure that the messages that are presented convey the meaning in a form that is understandable by the majority and that the instructions or advice is relevant and achievable.
Bibliographic Details
http://www.sciencedirect.com/science/article/pii/S1363412710000026; http://dx.doi.org/10.1016/j.istr.2010.04.001; http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=77956619767&origin=inward; https://linkinghub.elsevier.com/retrieve/pii/S1363412710000026; https://dul.usage.elsevier.com/doi/; https://api.elsevier.com/content/article/PII:S1363412710000026?httpAccept=text/xml; https://api.elsevier.com/content/article/PII:S1363412710000026?httpAccept=text/plain; https://ro.ecu.edu.au/ecuworks/6285; https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=7286&context=ecuworks; https://dx.doi.org/10.1016/j.istr.2010.04.001
Elsevier BV
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know