Hugh Wimberly | New Mexico Tech (original) (raw)
Uploads
Papers by Hugh Wimberly
Abstract Choosing the security architecture and policies for a system is a demanding task that mu... more Abstract Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. We investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In our study, we had 94 volunteers each create a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.
Bookmarks Related papers MentionsView impact
ABSTRACT Choosing the security architecture and policies for a system is a demanding task that mu... more ABSTRACT Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. Through a user study, I investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In the study, 94 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.
Bookmarks Related papers MentionsView impact
Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on com... more Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on computationally expensive inverse spectroscopy algorithms to determine probabilistic three dimensional mappings of the source and its intensity. This inverse spectroscopy algorithm applies to material accountability by determining the location and strength of nuclear materials. Because of the computational expense, the INL has incorporated new hardware from the commercial graphics community.
Bookmarks Related papers MentionsView impact
Security and Privacy (SP), 2011 …, Jan 1, 2011
Bookmarks Related papers MentionsView impact
Abstract Choosing the security architecture and policies for a system is a demanding task that mu... more Abstract Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. We investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In our study, we had 94 volunteers each create a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.
Bookmarks Related papers MentionsView impact
ABSTRACT Choosing the security architecture and policies for a system is a demanding task that mu... more ABSTRACT Choosing the security architecture and policies for a system is a demanding task that must be informed by an understanding of user behaviors. Through a user study, I investigate the hypothesis that adding visible security features to a system increases user confidence in the security of a system and thus causes users to behave less securely overall. In the study, 94 volunteers each created a pair of accounts, one secured only by a password and one secured by both a password and a fingerprint reader.
Bookmarks Related papers MentionsView impact
Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on com... more Abstract: The Idaho National Laboratory (INL) has developed a detector that relies heavily on computationally expensive inverse spectroscopy algorithms to determine probabilistic three dimensional mappings of the source and its intensity. This inverse spectroscopy algorithm applies to material accountability by determining the location and strength of nuclear materials. Because of the computational expense, the INL has incorporated new hardware from the commercial graphics community.
Bookmarks Related papers MentionsView impact
Security and Privacy (SP), 2011 …, Jan 1, 2011
Bookmarks Related papers MentionsView impact