10.08.2015 Views

Usability and Security

Usability and Security - Vurore

Usability and Security - Vurore

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.3 Research scopeThe research questions formulated above limit the scope of the thesis to a large extent. The two mainsubjects discussed in this thesis are usability <strong>and</strong> security:1. <strong>Security</strong>; here we focus on techniques for identifying <strong>and</strong> authenticating computer users tosystems that are both local <strong>and</strong> remote, which are passwords, mechanisms with a challengequestion, tokens <strong>and</strong> biometrics. These authentication mechanisms are commonly used to protectphysical- <strong>and</strong> logical access;2. <strong>Usability</strong>; here we focus on the usability issues associated with each of the authenticationmechanisms. The human-interaction-processing (‘human factor’) characteristics will not come upfor discussion in this thesis. However, where necessary it will be outlined as many authenticationmechanisms require cognitive activity.1.4 Research method1.4.1 Literary studyThe purpose of the literary study is to obtain more information about the subject <strong>and</strong> to help find answersto the research questions. We will carry out a literary study on usability <strong>and</strong> security <strong>and</strong> the techniquesfor identifying <strong>and</strong> authenticating computer users to systems. The literary study will also serve as a basisfor performing different case studies <strong>and</strong> interviews. Studies will be performed in relation to:• <strong>Usability</strong>;• <strong>Security</strong>;• Authentication techniques;• Relationship between usability <strong>and</strong> security;• Latest trends <strong>and</strong> developments on subjects mentioned above.During the whole process we will make use of various types of literature such as:• Books;• Scholarly journals;• Whitepapers <strong>and</strong> fact sheets;• Articles;• Research Studies.1.4.2 Case studyThe case study is an in-depth, longitudinal examination of different events <strong>and</strong> will allow us to gain asharpened underst<strong>and</strong>ing of why the instance happened as it did, <strong>and</strong> what might become important tolook at more extensively in future research. The case studies will cover topics on the different types ofauthentication mechanisms as defined in our research scope <strong>and</strong> also the usability issues associated witheach. These ‘real world’ examples allow the application of theoretical concepts to be demonstrated, thus2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!