Designing user studies for security applications: a case study with wireless network configuration

2009 ◽  
Vol 4 (1/2) ◽  
pp. 101 ◽  
Author(s):  
Cynthia Kuo ◽  
Adrian Perrig ◽  
Jesse Walker
Author(s):  
Cynthia Kuo ◽  
Adrian Perrig ◽  
Jesse Walker

End users often find that security configuration interfaces are difficult to use. In this chapter, we explore how application designers can improve the design and evaluation of security configuration interfaces. We use IEEE 802.11 network configuration as a case study. First, we design and implement a configuration interface that guides users through secure network configuration. The key insight is that users have a difficult time translating their security goals into specific feature configurations. Our interface automates the translation from users’ high-level goals to low-level feature configurations. Second, we develop and conduct a user study to compare our interface design with commercially available products. We adapt existing user research methods to sidestep common difficulties in evaluating security applications. Using our configuration interface, non-expert users are able to secure their networks as well as expert users. In general, our research addresses prevalent issues in the design and evaluation of consumer-configured security applications.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Christian Østergaard Madsen ◽  
Pernille Kræmmergaard

E-government channels are a key to achieving economic savings from public digitization. Citizens tend to use multiple channels in a service encounter and often use e-government channels as a supplement instead of replacing traditional channels. There is a lack of knowledge regarding how government organizations apply findings from user studies to migrate citizens online while reducing traffic through traditional channels. The authors present a case study on how public authorities collaborate to create a multichannel strategy for an online application for single parents. After the multichannel strategy was implemented, there was an increase in the use of the application and a reduction in telephone calls. The authors wrote this chapter to contribute to channel choice and multichannel management literature.


Author(s):  
Salman H. Khan ◽  
Arsalan H. Khan ◽  
Zeashan H. Khan

The role of computational intelligence techniques in applied sciences and engineering is becoming popular today. It is essential because the autonomous engineering applications require intelligent decision in real time in order to achieve the desired goal. This chapter discusses some of the approaches to demonstrate various applications of computational intelligence in dependable networked control systems and a case study of teleoperation over wireless network. The results have shown that computational intelligence algorithms can be successfully implemented on an embedded application to offer an improved online performance. The different approaches have been compared and could be chosen as per application requirements.


2016 ◽  
Vol 12 (10) ◽  
pp. 58 ◽  
Author(s):  
Guoqiang Hu

<p><span style="font-size: small;"><span style="font-family: Times New Roman;">In accordance with the deployment requirements of WLAN node in college student dorms and its features of application environment, this paper studies the relevance among factors like radio-frequency signal transmission characteristics, communication distance, AP height and transmission path, etc., with a case study of AP radio frequency 2.4GHz. Experiments show that the attenuation of wireless network signal in student dorms conforms to Keenan-Motley model. When AP is fixed, the signal strength received by laptop generally reduces with the increase of communication distance, yet just opposite with packet loss rate. When deploying AP, 1.25-1.75 height is ideal, and one-side coverage of 3 dorm rooms optimal. Based on the above researches, a relational model of AP height, communication distance and received signal strength is established. In it, model parameter  and AP height display a cubic polynomial relationship, and attenuation coefficient  and AP height show a quadratic polynomial relationship. Experiment results demonstrate that this model can satisfactorily predict the received signal strength of different AP heights and communication distances, providing technical support for wireless network deployment in student dorms. </span></span></p>


2012 ◽  
Vol 4 (3) ◽  
pp. 28-43 ◽  
Author(s):  
Denzil Ferreira ◽  
Vassilis Kostakos ◽  
Anind K. Dey

User studies with mobile devices have typically been cumbersome, since researchers have had to recruit participants, hand out or configure devices, and offer incentives and rewards. The increasing popularity of application stores has allowed researchers to use such mechanisms to recruit participants and conduct large-scale studies in authentic settings with relatively little effort. Most researchers who use application stores do not consider the side-effects or biases that such an approach may introduce. The authors summarize prior work that has reported experiences from using application stores as a recruiting, distribution and study mechanism, and also present a case study of a 4-week long study using the Android Market to deploy an application to over 4000 users that collected data on their mobile phone charging habits. The authors synthesize their own experiences with prior reported findings to discuss the challenges, advantages, limitations and considerations of using application stores as a recruitment and distribution approach for conducting large-scale studies.


Sign in / Sign up

Export Citation Format

Share Document