Quantcast
Channel: IxDA - security
Browsing all 10 articles
Browse latest View live

Password Strength Requirements

Does anyone have any evidence, anecdotal or formal, about how different password strength requirements impact the usability of a web-based application?There's a spectrum of different strength...

View Article



Input needed for courses in Design for Security

My first question on this platform. Well here it goes:I am restructuring my Experience Design courses for 1st and 2nd year bachelor students of Security Technology and I would really appreciate your...

View Article

Two-factor Authentication and Biometrics

Hi,Out of curiosity, has anybody implemented two-factor authentication using biometrics (e.g., fingerprint, voice, etc.) as the second factor?Thanks!

View Article

User cookie authentication vs. Security

Hi,I work for a very well-known publishing / corporate site that attracts a high number of C-level global visitors. Our Security IT department has has asked us to change our login procedures to...

View Article

Mikkel Michelsen: Mission-Critical Interaction Design

This short presentation provides an introduction to the exciting world of mission critical interaction design, where safety, security and protecting human life enters the realm of digital technology.In...

View Article


What's best practice regarding style guides/prototypes/HMI guidelines/process...

Let's say (hypothetically) you're working as an HFE-specialist for a major corporation developing huge situational awareness/command and control systems for many countries. The process for HFE/ID/UX is...

View Article

Research participants with familiarity with Heuristic Evaluation needed

LERSSE (Laboratory for Education and Research in Secure Systems Engineering) at the University of British Columbia is conducting a research project to evaluate the use of heuristic evaluation for...

View Article

Security in Interactive Design

Hey folks,read more

View Article


"Login" using Name, DOB and SSN

Scenario :User is filling out a long application for a financial product.  At first, they were going to have the ability to create and ID and password, so they can come back and continue at a later...

View Article


Grace Hopper Celebration of Women in Computing 2012 - Call for Participation...

 GRACE HOPPER CELEBRATION OF WOMEN IN COMPUTINGread more

View Article
Browsing all 10 articles
Browse latest View live




Latest Images