Learn More
The usability of security systems has become a major issue in research on the efficiency and user acceptance of security systems. The authentication process is essential for controlling the access to various resources and facilities. The design of usable yet secure user authentication methods raises crucial questions concerning how to solve conflicts(More)
The design of usable yet secure systems raises crucial questions when it comes to balancing properly security and usability. Finding the right tradeoff between these two quality attributes is not an easy endeavor. In this paper, we introduce an original design model based on a novel usability inspection method. This new method, named Security Usability(More)
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new(More)
  • Christina Braz, Christina Braz@hec Ca Ncho, Ambroise Ncho@umontreal Ambroise, Ca
  • 2003
The Electronic commerce technology presents the opportunity to blend and optimize the consumers' needs in terms of availability, speedy response time, and efficiency. Consumers around the world are communicating via Internet to obtain the availability of goods and services, to place and confirm orders, and to negotiate delivery times. With the development(More)
User authentication is key in many interactive tourism software applications and Websites including online booking and reservation applications, customer relationship management systems, etc. However, the design of a user authentication service raises crucial questions when it comes to properly balancing between security and usability. Furthermore, there is(More)
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans <i>network</i> (intercommunicate) continually with wireless devices. In this paper, we propose a new(More)
  • 1