|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
EBSCO_ocn682730537 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
101122t20102010dcua ob 100 0 eng d |
040 |
|
|
|a NRC
|b eng
|e rda
|e pn
|c NRC
|d N$T
|d CDX
|d OCLCQ
|d CDS
|d E7B
|d IDEBK
|d VPI
|d OCLCQ
|d CBT
|d YDXCP
|d OCLCQ
|d DEBSZ
|d COO
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCL
|d OCLCO
|d EBLCP
|d OCLCQ
|d OCLCO
|d LOA
|d OCLCO
|d AGLDB
|d MOR
|d PIFAG
|d VGM
|d OTZ
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d NJR
|d U3W
|d OCLCQ
|d STF
|d WRM
|d VTS
|d EZ9
|d ICG
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d LVT
|d TKN
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 690162711
|a 726823440
|a 746578176
|a 747719370
|a 764546463
|a 816615726
|a 961536350
|a 962632628
|a 1058115587
|
020 |
|
|
|a 9780309160919
|q (electronic bk.)
|
020 |
|
|
|a 030916091X
|q (electronic bk.)
|
020 |
|
|
|a 1282885782
|
020 |
|
|
|a 9781282885783
|
020 |
|
|
|z 09160901
|
020 |
|
|
|z 80309160902
|
020 |
|
|
|z 9780309160902
|
020 |
|
|
|z 0309160901
|
024 |
8 |
|
|a 9786612885785
|
029 |
1 |
|
|a AU@
|b 000051532718
|
029 |
1 |
|
|a CHNEW
|b 000635109
|
029 |
1 |
|
|a DEBBG
|b BV043039610
|
029 |
1 |
|
|a DEBBG
|b BV044109115
|
029 |
1 |
|
|a DEBSZ
|b 37274107X
|
029 |
1 |
|
|a DEBSZ
|b 421668253
|
029 |
1 |
|
|a DEBSZ
|b 449741559
|
029 |
1 |
|
|a NZ1
|b 13868952
|
029 |
1 |
|
|a AU@
|b 000066750297
|
035 |
|
|
|a (OCoLC)682730537
|z (OCoLC)690162711
|z (OCoLC)726823440
|z (OCoLC)746578176
|z (OCoLC)747719370
|z (OCoLC)764546463
|z (OCoLC)816615726
|z (OCoLC)961536350
|z (OCoLC)962632628
|z (OCoLC)1058115587
|
037 |
|
|
|a 288578
|b MIL
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a QA76.9.A25
|b N373 2010 ebook
|
050 |
|
4 |
|a QA76.9.U83
|b N385 2010 ebook
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a URD
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
110 |
2 |
|
|a National Research Council (U.S.).
|b Steering Committee on the Usability, Security, and Privacy of Computer Systems.
|
245 |
1 |
0 |
|a Toward better usability, security, and privacy of information technology :
|b report of a workshop /
|c Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies.
|
260 |
|
|
|a Washington, D.C. :
|b National Academies Press,
|c [2010], ©2010.
|
300 |
|
|
|a 1 online resource (xiv, 55 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Overview of security, privacy, and usability -- Framing the security and usability challenges -- Current research at the intersection of usability, security, and privacy -- Some potential research directions for furthering the usability, security, and privacy of computer systems -- Overarching challenges to advancing research in usability, security, and privacy -- Appendix A. Workshop agenda -- Appendix B. Workshop participants -- Appendix C. Biosketches of Steering Committee members and staff.
|
520 |
|
|
|a "Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged. Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection."--Publisher's description.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a User interfaces (Computer systems)
|v Congresses.
|
650 |
|
0 |
|a Information technology
|x Security measures
|v Congresses.
|
650 |
|
0 |
|a Privacy, Right of
|z United States
|v Congresses.
|
650 |
|
0 |
|a Electronic data processing
|x Moral and ethical aspects
|v Congresses.
|
650 |
|
6 |
|a Interfaces utilisateurs (Informatique)
|v Congrès.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures
|v Congrès.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Electronic data processing
|x Moral and ethical aspects
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Privacy, Right of
|2 fast
|
650 |
|
7 |
|a User interfaces (Computer systems)
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems.
|t Toward better usability, security, and privacy of information technology.
|d Washington, D.C. : National Academies Press, ©2010
|z 9780309160902
|w (OCoLC)681774035
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=343952
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36615402
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36559491
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 16422480
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL3378675
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10425164
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 343952
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 288578
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3558039
|
994 |
|
|
|a 92
|b IZTAP
|