Interaksi Manusia dan Komputer dalam Sudut Pandang Sistem Keamanan
https://doi.org/10.36342/teika.v2i2.121
Abstrak
Abstrak
Penggunaan komputer saat ini semakin luas setiap hari seiring dengan perkembangan teknologi informasi dan komunikasi. Namun perkembangan ini memunculkan permasalahan yang semakin besar dilihat dari sisi keamanan sistem. Karenanya perangkat-perangkat yang dikembangkan harus memperhatikan aspek kemananan. Aspek keamanan yang ditambahkan pada sistem seringkali menyebabkan harus mengorbankan kenyamanan pengguna dalam konteks interasi komputer dengan manusia.
Penelitian ini mencoba untuk mengkaji bagaimana mendesain sebuah antarmuka yang dapat mernenuhi aspek-aspek kemanan sistem namun juga tetap mengutamakan aspek kenyamanan pengguna.
Unduhan
Referensi
Ackerman, M. S., & Cranor, L. (1999) Privacy Critics: UI Components to Safeguard User's Privacy. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, Pittsburgh, Pennsylvania.
Ackerman, M. S., Darell, T., & Weitzner, D. (2001). Privacy in Context. Human Computer Interaction, 16(2), 167-176.
Anderson, J. P. (1972). Computer Security Tehnology Planning Study (No. ESD-TR-73-51). Bedford, MA: AFSC.
Brostoff, S., & Sasse, M. A. (2000). Are Passfaces More Usable Than Passwords? A Field Trial Investigation. In S. McDonald, Y. Waern, & G. Cockton (Eds.), People and computers XlV-Usability or Else! Proceedings of HCI 2000, Sunderland, UK.
Diaper, D., & Neville A, Stanton, N. A., (2004) The Handbook of Task Analysis for
Human-Computer Interaction.
Dourish, P., Grinter, R. E,, Dalal, B., Delgado de la Flor, J., & Dalal, M. (2003). Security
Day-to-Day: User Strategies for Managing Security as an Everyday, Practial Problern (ISR Technical Report No. UCI-ISR-05-5). Irvine: University of California.
Ellison, C., & Schneier, B. (2000). Ten Risks of PKI: What You're Not Being Told About
Public Key Infrastructure. Computer Security Joumal, 16(1), 1-7.
Kohnfelder, L. M. (1978). Towards a Practical Public-key Cryptosystem [B.S. Thesis]. Cambridge, MA: MIT.
Smith, S. L. (1987). Authenticating Users by Word Association. Computes & Security, 6
##submission.downloads##
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Share Alike Attribution Licence (CC-BY-SA What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.