Browsing by Author "Shava, Fungai Bhunu"
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Factors affecting user experience with security features: A case study of an academic institution in Namibia(IEEE, 2013) Shava, Fungai Bhunu; Greunen, Darelle VanThe widespread use of personal computers and other devices based on Information and Comm unication Technology (ICT) for networking and communication vi a the Internet exposes the end users to cybercriminals. Security systems and security features that interact with users via alerts, dialogue boxes and action buttons (such as update notices and other warnings) are embedded in operating systems and application programs in order to protect electronic in formation. Human behaviour and attitudes towards security features determine the user experience during the implementation of Information Security. Cyber criminals are primarily targeting the human aspect of security, since end users are easier to manipulate. In order to effectively secure information, the fields of Usable security and User experience should be integrated in the design and use of security features. This paper presents the findings of an online survey carried out to investigate attit udes towards, behaviour with and experience of embedded security features among members of staff in a tertiary education institution. User experience was measured by enumerating general security awareness, policy awareness and implementation, as well as user behaviour and emotions associated with security interaction. This paper reports on the findings of this survey. The researchers envisage that the findings can lead to the practical development and implementation of a framework for secure user experience .Item A User Awareness Model for averting Computer Threats(2014) Shava, Fungai Bhunu; Gamundani, Attlee M.One of the major reasons why systems are susceptible to threats in many ways or the other is the lack of the know-how and a follow up system for the education rendered to users, who in most cases are the weakest point for any perpetrated system attacks. Security awareness should be viewed as a gyratory exercise, as the attackers of systems never cease to explore on better and easier ways to penetrate organisational systems. This paper presents a user awareness model based on a case study done in one of the corporate environments in Namibia. The proposed model is a product of the different key facets that are perceived to be detrimental to system security in any average organisational setup. One of the major contributions of the User Awareness Model (UAM) is a systematic and procedural assessment tool of the user practice towards computer systems security, which can be applied to any organisational environment with the flexible option to vary the combination of security needs variables.