Password Strength Requirements
Does anyone have any evidence, anecdotal or formal, about how different password strength requirements impact the usability of a web-based application?There's a spectrum of different strength...
View ArticleInput needed for courses in Design for Security
My first question on this platform. Well here it goes:I am restructuring my Experience Design courses for 1st and 2nd year bachelor students of Security Technology and I would really appreciate your...
View ArticleTwo-factor Authentication and Biometrics
Hi,Out of curiosity, has anybody implemented two-factor authentication using biometrics (e.g., fingerprint, voice, etc.) as the second factor?Thanks!
View ArticleUser cookie authentication vs. Security
Hi,I work for a very well-known publishing / corporate site that attracts a high number of C-level global visitors. Our Security IT department has has asked us to change our login procedures to...
View ArticleMikkel Michelsen: Mission-Critical Interaction Design
This short presentation provides an introduction to the exciting world of mission critical interaction design, where safety, security and protecting human life enters the realm of digital technology.In...
View ArticleWhat's best practice regarding style guides/prototypes/HMI guidelines/process...
Let's say (hypothetically) you're working as an HFE-specialist for a major corporation developing huge situational awareness/command and control systems for many countries. The process for HFE/ID/UX is...
View ArticleResearch participants with familiarity with Heuristic Evaluation needed
LERSSE (Laboratory for Education and Research in Secure Systems Engineering) at the University of British Columbia is conducting a research project to evaluate the use of heuristic evaluation for...
View Article"Login" using Name, DOB and SSN
Scenario :User is filling out a long application for a financial product. At first, they were going to have the ability to create and ID and password, so they can come back and continue at a later...
View ArticleGrace Hopper Celebration of Women in Computing 2012 - Call for Participation...
GRACE HOPPER CELEBRATION OF WOMEN IN COMPUTINGread more
View Article
More Pages to Explore .....