Toward better usability, security, and privacy of information technology: report of a workshop
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, D.C.
National Academies Press
[2010], ©2010
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Description based on print version record |
Beschreibung: | 1 online resource (xiv, 55 pages) |
ISBN: | 0309160901 030916091X 9780309160902 9780309160919 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043039610 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2010 |||| o||u| ||||||eng d | ||
020 | |a 0309160901 |9 0-309-16090-1 | ||
020 | |a 030916091X |c electronic bk. |9 0-309-16091-X | ||
020 | |a 9780309160902 |9 978-0-309-16090-2 | ||
020 | |a 9780309160919 |c electronic bk. |9 978-0-309-16091-9 | ||
035 | |a (OCoLC)682730537 | ||
035 | |a (DE-599)BVBBV043039610 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
110 | 2 | |a National Research Council (U.S.) |b Steering Committee on the Usability, Security, and Privacy of Computer Systems |e Verfasser |4 aut | |
245 | 1 | 0 | |a Toward better usability, security, and privacy of information technology |b report of a workshop |c Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
264 | 1 | |a Washington, D.C. |b National Academies Press |c [2010], ©2010 | |
300 | |a 1 online resource (xiv, 55 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on print version record | ||
505 | 8 | |a Overview of security, privacy, and usability -- Framing the security and usability challenges -- Current research at the intersection of usability, security, and privacy -- Some potential research directions for furthering the usability, security, and privacy of computer systems -- Overarching challenges to advancing research in usability, security, and privacy -- Appendix A. Workshop agenda -- Appendix B. Workshop participants -- Appendix C. Biosketches of Steering Committee members and staff | |
505 | 8 | |a "Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged. Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection."--Publisher's description | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Electronic data processing / Moral and ethical aspects |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 7 | |a Privacy, Right of |2 fast | |
650 | 7 | |a User interfaces (Computer systems) |2 fast | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Ethik | |
650 | 4 | |a User interfaces (Computer systems) |v Congresses | |
650 | 4 | |a Information technology |x Security measures |v Congresses | |
650 | 4 | |a Privacy, Right of |z United States |v Congresses | |
650 | 4 | |a Electronic data processing |x Moral and ethical aspects |v Congresses | |
651 | 4 | |a USA | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems |t Toward better usability, security, and privacy of information technology |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028464257 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175402455793664 |
---|---|
any_adam_object | |
author_corporate | National Research Council (U.S.) Steering Committee on the Usability, Security, and Privacy of Computer Systems |
author_corporate_role | aut |
author_facet | National Research Council (U.S.) Steering Committee on the Usability, Security, and Privacy of Computer Systems |
author_sort | National Research Council (U.S.) Steering Committee on the Usability, Security, and Privacy of Computer Systems |
building | Verbundindex |
bvnumber | BV043039610 |
collection | ZDB-4-EBA |
contents | Overview of security, privacy, and usability -- Framing the security and usability challenges -- Current research at the intersection of usability, security, and privacy -- Some potential research directions for furthering the usability, security, and privacy of computer systems -- Overarching challenges to advancing research in usability, security, and privacy -- Appendix A. Workshop agenda -- Appendix B. Workshop participants -- Appendix C. Biosketches of Steering Committee members and staff "Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged. Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection."--Publisher's description |
ctrlnum | (OCoLC)682730537 (DE-599)BVBBV043039610 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04979nmm a2200577zc 4500</leader><controlfield tag="001">BV043039610</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309160901</subfield><subfield code="9">0-309-16090-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">030916091X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-309-16091-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309160902</subfield><subfield code="9">978-0-309-16090-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309160919</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-309-16091-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)682730537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043039610</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Steering Committee on the Usability, Security, and Privacy of Computer Systems</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Toward better usability, security, and privacy of information technology</subfield><subfield code="b">report of a workshop</subfield><subfield code="c">Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">[2010], ©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 55 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Overview of security, privacy, and usability -- Framing the security and usability challenges -- Current research at the intersection of usability, security, and privacy -- Some potential research directions for furthering the usability, security, and privacy of computer systems -- Overarching challenges to advancing research in usability, security, and privacy -- Appendix A. Workshop agenda -- Appendix B. Workshop participants -- Appendix C. Biosketches of Steering Committee members and staff</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged. Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection."--Publisher's description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic data processing / Moral and ethical aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Privacy, Right of</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">User interfaces (Computer systems)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User interfaces (Computer systems)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield><subfield code="z">United States</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Moral and ethical aspects</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems</subfield><subfield code="t">Toward better usability, security, and privacy of information technology</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028464257</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043039610 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:43Z |
institution | BVB |
isbn | 0309160901 030916091X 9780309160902 9780309160919 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028464257 |
oclc_num | 682730537 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (xiv, 55 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | National Academies Press |
record_format | marc |
spelling | National Research Council (U.S.) Steering Committee on the Usability, Security, and Privacy of Computer Systems Verfasser aut Toward better usability, security, and privacy of information technology report of a workshop Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies Washington, D.C. National Academies Press [2010], ©2010 1 online resource (xiv, 55 pages) txt rdacontent c rdamedia cr rdacarrier Description based on print version record Overview of security, privacy, and usability -- Framing the security and usability challenges -- Current research at the intersection of usability, security, and privacy -- Some potential research directions for furthering the usability, security, and privacy of computer systems -- Overarching challenges to advancing research in usability, security, and privacy -- Appendix A. Workshop agenda -- Appendix B. Workshop participants -- Appendix C. Biosketches of Steering Committee members and staff "Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged. Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection."--Publisher's description COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Electronic data processing / Moral and ethical aspects fast Information technology / Security measures fast Privacy, Right of fast User interfaces (Computer systems) fast Datenverarbeitung Ethik User interfaces (Computer systems) Congresses Information technology Security measures Congresses Privacy, Right of United States Congresses Electronic data processing Moral and ethical aspects Congresses USA (DE-588)1071861417 Konferenzschrift gnd-content Erscheint auch als Druck-Ausgabe National Research Council (U.S.). Steering Committee on the Usability, Security, and Privacy of Computer Systems Toward better usability, security, and privacy of information technology http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952 Aggregator Volltext |
spellingShingle | Toward better usability, security, and privacy of information technology report of a workshop Overview of security, privacy, and usability -- Framing the security and usability challenges -- Current research at the intersection of usability, security, and privacy -- Some potential research directions for furthering the usability, security, and privacy of computer systems -- Overarching challenges to advancing research in usability, security, and privacy -- Appendix A. Workshop agenda -- Appendix B. Workshop participants -- Appendix C. Biosketches of Steering Committee members and staff "Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use, configure, or operate systems in ways that are inadvertently insecure. Moreover, security and privacy technologies originally were developed in a context in which system administrators had primary responsibility for security and privacy protections and in which the users tended to be sophisticated. Today, the user base is much wider--including the vast majority of employees in many organizations and a large fraction of households--but the basic models for security and privacy are essentially unchanged. Security features can be clumsy and awkward to use and can present significant obstacles to getting work done. As a result, cybersecurity measures are all too often disabled or bypassed by the users they are intended to protect. Similarly, when security gets in the way of functionality, designers and administrators deemphasize it. The result is that end users often engage in actions, knowingly or unknowingly, that compromise the security of computer systems or contribute to the unwanted release of personal or other confidential information. Toward Better Usability, Security, and Privacy of Information Technology discusses computer system security and privacy, their relationship to usability, and research at their intersection."--Publisher's description COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Electronic data processing / Moral and ethical aspects fast Information technology / Security measures fast Privacy, Right of fast User interfaces (Computer systems) fast Datenverarbeitung Ethik User interfaces (Computer systems) Congresses Information technology Security measures Congresses Privacy, Right of United States Congresses Electronic data processing Moral and ethical aspects Congresses |
subject_GND | (DE-588)1071861417 |
title | Toward better usability, security, and privacy of information technology report of a workshop |
title_auth | Toward better usability, security, and privacy of information technology report of a workshop |
title_exact_search | Toward better usability, security, and privacy of information technology report of a workshop |
title_full | Toward better usability, security, and privacy of information technology report of a workshop Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
title_fullStr | Toward better usability, security, and privacy of information technology report of a workshop Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
title_full_unstemmed | Toward better usability, security, and privacy of information technology report of a workshop Steering Committee on the Usability, Security, and Privacy of Computer Systems, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
title_short | Toward better usability, security, and privacy of information technology |
title_sort | toward better usability security and privacy of information technology report of a workshop |
title_sub | report of a workshop |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Electronic data processing / Moral and ethical aspects fast Information technology / Security measures fast Privacy, Right of fast User interfaces (Computer systems) fast Datenverarbeitung Ethik User interfaces (Computer systems) Congresses Information technology Security measures Congresses Privacy, Right of United States Congresses Electronic data processing Moral and ethical aspects Congresses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Electronic data processing / Moral and ethical aspects Information technology / Security measures Privacy, Right of User interfaces (Computer systems) Datenverarbeitung Ethik User interfaces (Computer systems) Congresses Information technology Security measures Congresses Privacy, Right of United States Congresses Electronic data processing Moral and ethical aspects Congresses USA Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343952 |
work_keys_str_mv | AT nationalresearchcouncilussteeringcommitteeontheusabilitysecurityandprivacyofcomputersystems towardbetterusabilitysecurityandprivacyofinformationtechnologyreportofaworkshop |