首页 > 最新文献

Computer Human Interaction for Management of Information Technology最新文献

英文 中文
Filter-based access control model: exploring a more usable database management 基于过滤器的访问控制模型:探索更可用的数据库管理
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873564
Nachi Ueno, Ryota Hashimoto, Hisaharu Ishii, Hiroyuki Makino, Yuzuru Kitayama
In this study, we tested the usability of database management software for end-users. To improve the usability, novel concept Filter based Access Control model (FBAC) and FBAC UI have been developed. We conducted a user test and analyzed the results. In the test, 40 users tried to solve two tasks: 20 used Role based Access Control Model (RBAC) UI, and the rest FBAC UI. In the results, almost no RBAC UI users could complete the tasks, but users who used FBAC completed 40%.
在本研究中,我们测试了数据库管理软件对最终用户的可用性。为了提高可用性,提出了基于过滤器的访问控制模型(FBAC)和FBAC用户界面。我们进行了用户测试并分析了结果。在测试中,40个用户尝试解决两个任务:20个使用基于角色的访问控制模型(RBAC) UI,其余使用FBAC UI。在结果中,几乎没有RBAC用户能够完成任务,但使用FBAC的用户完成了40%的任务。
{"title":"Filter-based access control model: exploring a more usable database management","authors":"Nachi Ueno, Ryota Hashimoto, Hisaharu Ishii, Hiroyuki Makino, Yuzuru Kitayama","doi":"10.1145/1873561.1873564","DOIUrl":"https://doi.org/10.1145/1873561.1873564","url":null,"abstract":"In this study, we tested the usability of database management software for end-users. To improve the usability, novel concept Filter based Access Control model (FBAC) and FBAC UI have been developed. We conducted a user test and analyzed the results. In the test, 40 users tried to solve two tasks: 20 used Role based Access Control Model (RBAC) UI, and the rest FBAC UI. In the results, almost no RBAC UI users could complete the tasks, but users who used FBAC completed 40%.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Principles for applying social navigation to collaborative systems 将社交导航应用于协作系统的原则
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873563
Min Wu, C. Bowles
This paper proposes that social navigation can solve many of the challenges facing user experience in collaborative systems. Three key values and three phases of design for social navigation support are identified. The values of social navigation support in collaboration are: discovery of new features; predicting the consequence of certain actions and decisions based on what other people have done previously; and conveying cultural context to meet the expectations of other members of the collaborative space. The phases are: collection of what other people have done; evaluation of consequences about the actions and decisions users can make; and presentation of the appropriate information to help the user with the best decision. The paper outlines how each value can be maximized through design at each phase. Examples are provided to illustrate that social navigation is ready to be integrated into collaboration tools to improve overall usability.
本文提出社交导航可以解决协作系统中用户体验面临的许多挑战。确定了社会导航支持设计的三个关键值和三个阶段。协作中的社交导航支持的价值在于:发现新功能;根据别人以前的行为和决定来预测某些行为和决定的后果;并传达文化背景,以满足协作空间中其他成员的期望。这些阶段是:收集其他人已经做过的事情;评估用户可能做出的行动和决策的后果;并提供适当的信息,以帮助用户做出最佳决策。本文概述了如何通过每个阶段的设计使每个价值最大化。本文提供了一些示例,说明社交导航可以集成到协作工具中,从而提高整体可用性。
{"title":"Principles for applying social navigation to collaborative systems","authors":"Min Wu, C. Bowles","doi":"10.1145/1873561.1873563","DOIUrl":"https://doi.org/10.1145/1873561.1873563","url":null,"abstract":"This paper proposes that social navigation can solve many of the challenges facing user experience in collaborative systems. Three key values and three phases of design for social navigation support are identified. The values of social navigation support in collaboration are: discovery of new features; predicting the consequence of certain actions and decisions based on what other people have done previously; and conveying cultural context to meet the expectations of other members of the collaborative space. The phases are: collection of what other people have done; evaluation of consequences about the actions and decisions users can make; and presentation of the appropriate information to help the user with the best decision. The paper outlines how each value can be maximized through design at each phase. Examples are provided to illustrate that social navigation is ready to be integrated into collaboration tools to improve overall usability.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Transparent collaboration: letting users simulate another user's world 透明协作:让用户模拟另一个用户的世界
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873568
C. Bowles, Min Wu
While trying to learn how to use current collaboration systems, users face many challenges, including difficulty trying out new features and experimenting without their actions affecting other users. This paper proposes an innovative approach to solve these problems by simulating the collaboration system. In this simulated environment, a user can: confirm the effect of certain actions on other people before performing the actions; check what information can be accessed by other users; and interact as another user to see if the user can perform tasks as expected. By simulating the collaboration with more than one person simultaneously, a user can test synchronous communication features using a single account. Integrating this solution into the current collaboration environment will improve the usability of collaboration software, and reduce users' reliance on administrators to support their collaboration interactions.
在尝试学习如何使用当前的协作系统时,用户面临许多挑战,包括在不影响其他用户的情况下尝试新功能和实验的困难。本文提出了一种通过模拟协同系统来解决这些问题的创新方法。在这个模拟环境中,用户可以:在执行某个动作之前,确认该动作对其他人的影响;检查哪些信息可以被其他用户访问;并以另一个用户的身份进行交互,看看用户是否能按预期执行任务。通过模拟多人同时协作,用户可以使用单个帐户测试同步通信功能。将此解决方案集成到当前的协作环境中,将提高协作软件的可用性,并减少用户对管理员支持其协作交互的依赖。
{"title":"Transparent collaboration: letting users simulate another user's world","authors":"C. Bowles, Min Wu","doi":"10.1145/1873561.1873568","DOIUrl":"https://doi.org/10.1145/1873561.1873568","url":null,"abstract":"While trying to learn how to use current collaboration systems, users face many challenges, including difficulty trying out new features and experimenting without their actions affecting other users. This paper proposes an innovative approach to solve these problems by simulating the collaboration system. In this simulated environment, a user can: confirm the effect of certain actions on other people before performing the actions; check what information can be accessed by other users; and interact as another user to see if the user can perform tasks as expected. By simulating the collaboration with more than one person simultaneously, a user can test synchronous communication features using a single account. Integrating this solution into the current collaboration environment will improve the usability of collaboration software, and reduce users' reliance on administrators to support their collaboration interactions.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A collaborative ontology development tool for information security managers 面向信息安全管理人员的协同本体开发工具
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873566
John C. Mace, S. Parkin, A. Moorsel
This paper explores the need for a collaborative development tool to allow information security experts to capture their interrelated knowledge in an ontology. Such a tool would enable organisations to make more informed security policy decisions around shared security issues. However, population of ontologies can be time-consuming and error-prone, and current collaborative ontology editing tools require a familiarity with ontology concepts. We present a Web-oriented tool which simplifies ontology population for information security experts, allowing them to develop ontology content without the need to understand ontology concepts. To understand how organisations manage information security knowledge within policies, we consulted two information security managers in large organisations. The Web-Protégé collaborative ontology editor was then modified to create a tool with an appropriate knowledge ontology structure that meets their requirements. The same information security managers then evaluated the tool, judging it to be accessible and potentially useful in policy decision-making.
本文探讨了协作开发工具的需求,以允许信息安全专家在本体中捕获他们的相关知识。这样的工具将使组织能够围绕共享的安全问题做出更明智的安全策略决策。然而,本体的填充可能是耗时且容易出错的,并且当前的协作本体编辑工具需要熟悉本体概念。我们提出了一个面向web的工具,它简化了信息安全专家的本体填充,使他们能够在不需要理解本体概念的情况下开发本体内容。为了解机构如何在政策范围内管理资讯保安知识,我们谘询了两名大型机构的资讯保安经理。然后,对web - prot协作本体编辑器进行修改,以创建一个具有满足其需求的适当知识本体结构的工具。然后,同样的信息安全管理人员对该工具进行评估,判断它是可访问的,并且在策略决策中可能有用。
{"title":"A collaborative ontology development tool for information security managers","authors":"John C. Mace, S. Parkin, A. Moorsel","doi":"10.1145/1873561.1873566","DOIUrl":"https://doi.org/10.1145/1873561.1873566","url":null,"abstract":"This paper explores the need for a collaborative development tool to allow information security experts to capture their interrelated knowledge in an ontology. Such a tool would enable organisations to make more informed security policy decisions around shared security issues. However, population of ontologies can be time-consuming and error-prone, and current collaborative ontology editing tools require a familiarity with ontology concepts. We present a Web-oriented tool which simplifies ontology population for information security experts, allowing them to develop ontology content without the need to understand ontology concepts. To understand how organisations manage information security knowledge within policies, we consulted two information security managers in large organisations. The Web-Protégé collaborative ontology editor was then modified to create a tool with an appropriate knowledge ontology structure that meets their requirements. The same information security managers then evaluated the tool, judging it to be accessible and potentially useful in policy decision-making.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133604963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Johnny can drag and drop: determining user intent through traditional interactions to improve desktop security Johnny可以拖放:通过传统的交互来确定用户意图,从而提高桌面安全性
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873565
P. F. Wilbur, T. Deshane
In this paper, we identify the primary difficulties encountered when security systems include users in the decision-making process. We propose security system inquiry mechanisms, designed around file open dialogs and drag-and-drop interfaces, to increase the accuracy of information obtained from users while also maintaining a high level of user inclusiveness in security decisions. We note that, although it has been previously shown that many users are inherently bad at making final security decisions, useful information regarding user intent can be accurately obtained by using our inquiry mechanisms. In particular, inquiry mechanisms that parallel the actions within applications the user actually intends to perform prompt the user in ways that are understandable and likely to receive accurate responses. We discuss how our system eliminates the traditional problems faced in security systems due to false positives and false negatives.
在本文中,我们确定了当安全系统在决策过程中包含用户时遇到的主要困难。我们提出了围绕文件打开对话框和拖放界面设计的安全系统查询机制,以提高从用户获取信息的准确性,同时在安全决策中保持高水平的用户包容性。我们注意到,尽管之前的研究表明,许多用户天生不擅长做出最终的安全决策,但通过使用我们的查询机制,可以准确地获得有关用户意图的有用信息。特别是,与用户实际打算执行的应用程序中的操作并行的查询机制以可理解的方式提示用户,并可能收到准确的响应。我们讨论了我们的系统如何消除安全系统中由于误报和误报而面临的传统问题。
{"title":"Johnny can drag and drop: determining user intent through traditional interactions to improve desktop security","authors":"P. F. Wilbur, T. Deshane","doi":"10.1145/1873561.1873565","DOIUrl":"https://doi.org/10.1145/1873561.1873565","url":null,"abstract":"In this paper, we identify the primary difficulties encountered when security systems include users in the decision-making process. We propose security system inquiry mechanisms, designed around file open dialogs and drag-and-drop interfaces, to increase the accuracy of information obtained from users while also maintaining a high level of user inclusiveness in security decisions. We note that, although it has been previously shown that many users are inherently bad at making final security decisions, useful information regarding user intent can be accurately obtained by using our inquiry mechanisms. In particular, inquiry mechanisms that parallel the actions within applications the user actually intends to perform prompt the user in ways that are understandable and likely to receive accurate responses. We discuss how our system eliminates the traditional problems faced in security systems due to false positives and false negatives.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127490273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
People frames: the social construction of information systems 人的框架:信息系统的社会建构
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873562
Le Db, Roux, Gp Le Roux
The management of IT involves the thoughtful consideration of the management of stakeholders' knowledge as information system success depends upon synergy between human and technical systems. In this paper particular attention is paid to the notion of frames, or frames of reference, held by the stakeholders of information systems and their effects on system adoption and use. A qualitative study is performed in the context of an engineering firm's adoption of a commercial ERP package. Findings suggest that besides frames of technology, the beliefs and perceptions that stakeholders have of each other influence their utilization of technological artifacts and influence the operation of information systems.
信息技术的管理涉及对利益相关者知识的管理的深思熟虑,因为信息系统的成功取决于人与技术系统之间的协同作用。本文特别关注信息系统利益相关者所持有的框架或参考框架的概念及其对系统采用和使用的影响。定性研究是在一个工程公司采用商业ERP软件包的背景下进行的。研究结果表明,除了技术框架之外,利益相关者对彼此的信念和看法也会影响他们对技术工件的利用,并影响信息系统的运行。
{"title":"People frames: the social construction of information systems","authors":"Le Db, Roux, Gp Le Roux","doi":"10.1145/1873561.1873562","DOIUrl":"https://doi.org/10.1145/1873561.1873562","url":null,"abstract":"The management of IT involves the thoughtful consideration of the management of stakeholders' knowledge as information system success depends upon synergy between human and technical systems. In this paper particular attention is paid to the notion of frames, or frames of reference, held by the stakeholders of information systems and their effects on system adoption and use. A qualitative study is performed in the context of an engineering firm's adoption of a commercial ERP package. Findings suggest that besides frames of technology, the beliefs and perceptions that stakeholders have of each other influence their utilization of technological artifacts and influence the operation of information systems.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121922315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards a task oriented method for accessing network based services 一种面向任务的访问基于网络的服务的方法
Pub Date : 2010-11-12 DOI: 10.1145/1873561.1873567
Nils Pedersen, P. Clark, Martine Freiberger
Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel and, in some cases, also select the appropriate wireless network. As more sophisticated security models are incorporated into networks, the user's task in managing these settings will become more complex. This paper describes a design which simplifies the task of accessing network based services using a more user oriented, less technology centric task flow.
今天的网络用户需要在他们的计算机上配置许多不同的网络设置,以便访问特定的基于网络的服务。例如,这些用户需要知道是否启用虚拟专用网(VPN)隧道,在某些情况下,还需要选择合适的无线网络。随着更复杂的安全模型被纳入网络,用户管理这些设置的任务将变得更加复杂。本文描述了一种简化基于网络的服务访问任务的设计,使用更多的面向用户,更少的以技术为中心的任务流。
{"title":"Towards a task oriented method for accessing network based services","authors":"Nils Pedersen, P. Clark, Martine Freiberger","doi":"10.1145/1873561.1873567","DOIUrl":"https://doi.org/10.1145/1873561.1873567","url":null,"abstract":"Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel and, in some cases, also select the appropriate wireless network. As more sophisticated security models are incorporated into networks, the user's task in managing these settings will become more complex.\u0000 This paper describes a design which simplifies the task of accessing network based services using a more user oriented, less technology centric task flow.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT-management software deployment: field findings and design guidelines it管理软件部署:现场调查结果和设计指南
Pub Date : 2008-11-14 DOI: 10.1145/1477973.1477985
Lance Bloom, Nancy Clark
This paper reports field research of Enterprise IT-Management Software deployments in corporate data centers. The observed deployments were complex, time-consuming and often did not provide tools and documentation that optimally supported IT Professionals' work. The findings highlight deployment work practices and challenges, and inform guidelines for designing deployment tools and documentation that support IT Professionals' work.
本文报告了企业it管理软件在企业数据中心部署的实地研究。观察到的部署是复杂的,耗时的,并且通常没有提供最佳地支持IT专业人员工作的工具和文档。这些发现突出了部署工作实践和挑战,并为设计支持IT专业人员工作的部署工具和文档提供了指导方针。
{"title":"IT-management software deployment: field findings and design guidelines","authors":"Lance Bloom, Nancy Clark","doi":"10.1145/1477973.1477985","DOIUrl":"https://doi.org/10.1145/1477973.1477985","url":null,"abstract":"This paper reports field research of Enterprise IT-Management Software deployments in corporate data centers. The observed deployments were complex, time-consuming and often did not provide tools and documentation that optimally supported IT Professionals' work. The findings highlight deployment work practices and challenges, and inform guidelines for designing deployment tools and documentation that support IT Professionals' work.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125403448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Guidelines for designing IT security management tools 设计IT安全管理工具的指引
Pub Date : 2008-11-14 DOI: 10.1145/1477973.1477983
P. Jaferian, David Botta, F. Raja, K. Hawkey, K. Beznosov
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and challenges in IT security management. We also illustrated the need for the guidelines, where possible, with quotes from additional interviews with five security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools.
影响组织内安全系统有效性的一个重要因素是安全管理工具的可用性。在本文中,我们提出了这类工具的设计指南的调查。我们从文献以及我们自己先前对IT安全管理的研究中收集了与IT安全管理工具相关的指导方针和建议。我们将这些分类并组合成一组高级指导方针,并确定了指导方针与IT安全管理中的挑战之间的关系。在可能的情况下,我们还引用了对五名安全从业人员的额外采访,说明了指南的必要性。我们的指导方针框架可以被那些开发IT安全工具的人使用,也可以被从业者和评估工具的管理人员使用。
{"title":"Guidelines for designing IT security management tools","authors":"P. Jaferian, David Botta, F. Raja, K. Hawkey, K. Beznosov","doi":"10.1145/1477973.1477983","DOIUrl":"https://doi.org/10.1145/1477973.1477983","url":null,"abstract":"An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of design guidelines for such tools. We gathered guidelines and recommendations related to IT security management tools from the literature as well as from our own prior studies of IT security management. We categorized and combined these into a set of high level guidelines and identified the relationships between the guidelines and challenges in IT security management. We also illustrated the need for the guidelines, where possible, with quotes from additional interviews with five security practitioners. Our framework of guidelines can be used by those developing IT security tools, as well as by practitioners and managers evaluating tools.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Network authentication using single sign-on: the challenge of aligning mental models 使用单点登录的网络身份验证:调整心智模型的挑战
Pub Date : 2008-11-14 DOI: 10.1145/1477973.1477982
Rosa R. Heckle, W. Lutters, David Gurzick
Healthcare organizations are struggling to meet industry best practices for information security as well as complying with regulatory requirements. Single sign-on technology is emerging as a leading technology for password authentication management and promises to improve security while curbing system maintenance costs. While the technology seems to be a simple viable solution for authentication, when placed in context, many socio-technical complexities emerge. One of these complexities is that of the mismatch between the users' mental models and the system model. This study was a 15-month ethnographic field study that followed the implementation of a single sign-on system in a hospital environment. It resulted in the finding that the misaligned mental models caused difficulties not only for the user but for the system administrators. The findings also indicate that not only was the user's mental model of the technology inaccurate, but the presentation of the technology by the information technology group contributed to this misaligned understanding. The end result was dissatisfaction with the new technology for both end users and the system administrators. In order to address the critical issue of mental model misalignment in the implementation of SSO technology, practitioners must first gain an understanding of the preexisting mental models had by the target users regarding authentication and then use this information to guide implementation of the new technology.
医疗保健组织正在努力满足信息安全的行业最佳实践以及遵守法规要求。单点登录技术正在成为密码认证管理的领先技术,有望在降低系统维护成本的同时提高安全性。虽然该技术似乎是一种简单可行的身份验证解决方案,但当置于上下文中时,就会出现许多社会技术复杂性。其中一个复杂性是用户的心智模型和系统模型之间的不匹配。本研究是一项为期15个月的人种学实地研究,在医院环境中实施单点登录系统。结果发现,不一致的心智模型不仅给用户而且给系统管理员带来了困难。研究结果还表明,不仅用户对技术的心理模型不准确,而且信息技术组对技术的描述也导致了这种不一致的理解。最终的结果是最终用户和系统管理员都对新技术不满意。为了解决SSO技术实现中心智模型不一致的关键问题,从业者必须首先了解目标用户关于身份验证的预先存在的心智模型,然后使用该信息指导新技术的实现。
{"title":"Network authentication using single sign-on: the challenge of aligning mental models","authors":"Rosa R. Heckle, W. Lutters, David Gurzick","doi":"10.1145/1477973.1477982","DOIUrl":"https://doi.org/10.1145/1477973.1477982","url":null,"abstract":"Healthcare organizations are struggling to meet industry best practices for information security as well as complying with regulatory requirements. Single sign-on technology is emerging as a leading technology for password authentication management and promises to improve security while curbing system maintenance costs. While the technology seems to be a simple viable solution for authentication, when placed in context, many socio-technical complexities emerge. One of these complexities is that of the mismatch between the users' mental models and the system model.\u0000 This study was a 15-month ethnographic field study that followed the implementation of a single sign-on system in a hospital environment. It resulted in the finding that the misaligned mental models caused difficulties not only for the user but for the system administrators. The findings also indicate that not only was the user's mental model of the technology inaccurate, but the presentation of the technology by the information technology group contributed to this misaligned understanding. The end result was dissatisfaction with the new technology for both end users and the system administrators.\u0000 In order to address the critical issue of mental model misalignment in the implementation of SSO technology, practitioners must first gain an understanding of the preexisting mental models had by the target users regarding authentication and then use this information to guide implementation of the new technology.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Computer Human Interaction for Management of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1