Matching Items (418)
Filtering by

Clear all filters

153487-Thumbnail Image.png
Description
Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL,

Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL, browsers like Mozilla Firefox and Google Chrome display an 'active' warning message in an attempt to stop the user from making a potentially dangerous decision of visiting the website and sharing confidential information like username-password, credit card information, social security number etc.

However, these warnings are not always successful at safeguarding the user from a phishing attack. On several occasions, users ignore these warnings and 'click through' them, eventually landing at the potentially dangerous website and giving away confidential information. Failure to understand the warning, failure to differentiate different types of browser warnings, diminishing trust on browser warnings due to repeated encounter are some of the reasons that make users ignore these warnings. It is important to address these factors in order to eventually improve a user’s reaction to these warnings.

In this thesis, I propose a novel design to improve the effectiveness and reliability of phishing warning messages. This design utilizes the name of the target website that a fake website is mimicking, to display a simple, easy to understand and interactive warning message with the primary objective of keeping the user away from a potentially spoof website.
ContributorsSharma, Satyabrata (Author) / Bazzi, Rida (Thesis advisor) / Walker, Erin (Committee member) / Gaffar, Ashraf (Committee member) / Arizona State University (Publisher)
Created2015
150026-Thumbnail Image.png
Description
As pointed out in the keynote speech by H. V. Jagadish in SIGMOD'07, and also commonly agreed in the database community, the usability of structured data by casual users is as important as the data management systems' functionalities. A major hardness of using structured data is the problem of easily

As pointed out in the keynote speech by H. V. Jagadish in SIGMOD'07, and also commonly agreed in the database community, the usability of structured data by casual users is as important as the data management systems' functionalities. A major hardness of using structured data is the problem of easily retrieving information from them given a user's information needs. Learning and using a structured query language (e.g., SQL and XQuery) is overwhelmingly burdensome for most users, as not only are these languages sophisticated, but the users need to know the data schema. Keyword search provides us with opportunities to conveniently access structured data and potentially significantly enhances the usability of structured data. However, processing keyword search on structured data is challenging due to various types of ambiguities such as structural ambiguity (keyword queries have no structure), keyword ambiguity (the keywords may not be accurate), user preference ambiguity (the user may have implicit preferences that are not indicated in the query), as well as the efficiency challenges due to large search space. This dissertation performs an expansive study on keyword search processing techniques as a gateway for users to access structured data and retrieve desired information. The key issues addressed include: (1) Resolving structural ambiguities in keyword queries by generating meaningful query results, which involves identifying relevant keyword matches, identifying return information, composing query results based on relevant matches and return information. (2) Resolving structural, keyword and user preference ambiguities through result analysis, including snippet generation, result differentiation, result clustering, result summarization/query expansion, etc. (3) Resolving the efficiency challenge in processing keyword search on structured data by utilizing and efficiently maintaining materialized views. These works deliver significant technical contributions towards building a full-fledged search engine for structured data.
ContributorsLiu, Ziyang (Author) / Chen, Yi (Thesis advisor) / Candan, Kasim S (Committee member) / Davulcu, Hasan (Committee member) / Jagadish, H V (Committee member) / Arizona State University (Publisher)
Created2011
132805-Thumbnail Image.png
Description
Usability in the Internet of Things (IOT) in the Smart Home is a new concept with limited current research, especially in user perception. User perception is an important aspect in the development of Smart Home Internet of Things systems, including smart home products and devices and in the design of

Usability in the Internet of Things (IOT) in the Smart Home is a new concept with limited current research, especially in user perception. User perception is an important aspect in the development of Smart Home Internet of Things systems, including smart home products and devices and in the design of the Smart Home experience. The aim of my thesis is to investigate user perceptions of Smart Home Internet of Things systems to understand how usable current Smart Home Internet of Things systems are from the perception of the user and how that impacts the Smart Home experience. By understanding the usability of Smart Home Internet of Things systems, we can better design Smart Home devices and products for a user-centered experience. My thesis informs the design of user-centered Smart Home Internet of Things systems and experiences.

This study includes a literature review and an empirical study. The empirical study is a usability testing survey that investigates user perceptions of Smart Home technology that make up the Internet of Things system in the Smart Home. Both closed-ended questions and open-ended questions are included in the survey for a comprehensive study. Main results showed that current smart home systems are somewhat usable. Results also showed that smart home users are satisfied with current smart home systems, believes that smart home technology adds value to their lifestyle, and will continue to use smart home technology. Main results showed that the strengths of current smart home systems design are efficiency, learnability, memorability, and enjoyability. Main results showed that there is a trend between age group and smart home user perceptions. These findings inform the design of user-centered smart home systems.
ContributorsChuong, Samantha (Author) / Bowman, Diana (Thesis director) / Michael, Katina (Committee member) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
154796-Thumbnail Image.png
Description
In the last decade, the number of people who own a mobile phone or portable electronic communication device has grown exponentially. Recent advances in smartphone technology have enabled mobile devices to provide applications (“mHealth apps”) to support delivering interventions, tracking health treatments, or involving a healthcare team into the treatment

In the last decade, the number of people who own a mobile phone or portable electronic communication device has grown exponentially. Recent advances in smartphone technology have enabled mobile devices to provide applications (“mHealth apps”) to support delivering interventions, tracking health treatments, or involving a healthcare team into the treatment process and symptom monitoring. Although the popularity of mHealth apps is increasing, few lessons have been shared regarding user experience design and evaluation for such innovations as they relate to clinical outcomes. Studies assessing usability for mobile apps primarily rely on survey instruments. Though surveys are effective in determining user perception of usability and positive attitudes towards an app, they do not directly assess app feature usage, and whether feature usage and related aspects of app design are indicative of whether intended tasks are completed by users. This is significant in the area of mHealth apps, as proper utilization of the app determines compliance to a clinical study protocol. Therefore it is important to understand how design directly impacts compliance, specifically what design factors are prevalent in non-compliant users. This research studies the impact of usability features on clinical protocol compliance by applying a mixed methods approach to usability assessment, combining traditional surveys, log analysis, and clickstream analysis to determine the connection of design to outcomes. This research is novel in its construction of the mixed methods approach and in its attempt to tie usability results to impacts on clinical protocol compliance. The validation is a case study approach, applying the methods to an mHealth app developed for early prevention of anxiety in middle school students. The results of three empirical studies are shared that support the construction of the mixed methods approach.
ContributorsPatwardhan, Mandar (Author) / Gary, Kevin A (Thesis advisor) / Pina, Armando (Committee member) / Amresh, Ashish (Committee member) / Arizona State University (Publisher)
Created2016
ContributorsEvans, Bartlett R. (Conductor) / Schildkret, David (Conductor) / Glenn, Erica (Conductor) / Concert Choir (Performer) / Chamber Singers (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-16
147542-Thumbnail Image.png
Description

As much as SARS-CoV-2 has altered the way humans live since the beginning of 2020, this virus's deadly nature has required clinical testing to meet 2020's demands of higher throughput, higher accuracy and higher efficiency. Information technology has allowed institutions, like Arizona State University (ASU), to make strategic and operational

As much as SARS-CoV-2 has altered the way humans live since the beginning of 2020, this virus's deadly nature has required clinical testing to meet 2020's demands of higher throughput, higher accuracy and higher efficiency. Information technology has allowed institutions, like Arizona State University (ASU), to make strategic and operational changes to combat the SARS-CoV-2 pandemic. At ASU, information technology was one of the six facets identified in the ongoing review of the ASU Biodesign Clinical Testing Laboratory (ABCTL) among business, communications, management/training, law, and clinical analysis. The first chapter of this manuscript covers the background of clinical laboratory automation and details the automated laboratory workflow to perform ABCTL’s COVID-19 diagnostic testing. The second chapter discusses the usability and efficiency of key information technology systems of the ABCTL. The third chapter explains the role of quality control and data management within ABCTL’s use of information technology. The fourth chapter highlights the importance of data modeling and 10 best practices when responding to future public health emergencies.

ContributorsLeung, Michael (Co-author) / Kandan, Mani (Co-author) / Knox, Garrett (Co-author) / Woo, Sabrina (Co-author) / Compton, Carolyn (Thesis director) / Dudley, Sean (Committee member) / School of Molecular Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147796-Thumbnail Image.png
Description

As much as SARS-CoV-2 has altered the way humans live since the beginning of 2020,<br/>this virus's deadly nature has required clinical testing to meet 2020's demands of higher<br/>throughput, higher accuracy and higher efficiency. Information technology has allowed<br/>institutions, like Arizona State University (ASU), to make strategic and operational changes to<br/>combat the

As much as SARS-CoV-2 has altered the way humans live since the beginning of 2020,<br/>this virus's deadly nature has required clinical testing to meet 2020's demands of higher<br/>throughput, higher accuracy and higher efficiency. Information technology has allowed<br/>institutions, like Arizona State University (ASU), to make strategic and operational changes to<br/>combat the SARS-CoV-2 pandemic. At ASU, information technology was one of the six facets<br/>identified in the ongoing review of the ASU Biodesign Clinical Testing Laboratory (ABCTL)<br/>among business, communications, management/training, law, and clinical analysis. The first<br/>chapter of this manuscript covers the background of clinical laboratory automation and details<br/>the automated laboratory workflow to perform ABCTL’s COVID-19 diagnostic testing. The<br/>second chapter discusses the usability and efficiency of key information technology systems of<br/>the ABCTL. The third chapter explains the role of quality control and data management within<br/>ABCTL’s use of information technology. The fourth chapter highlights the importance of data<br/>modeling and 10 best practices when responding to future public health emergencies.

ContributorsKandan, Mani (Co-author) / Leung, Michael (Co-author) / Woo, Sabrina (Co-author) / Knox, Garrett (Co-author) / Compton, Carolyn (Thesis director) / Dudley, Sean (Committee member) / Computer Science and Engineering Program (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
ContributorsOwen, Ken (Conductor) / McDevitt, Mandy L. M. (Performer) / Larson, Brook (Conductor) / Wang, Lin-Yu (Performer) / Jacobs, Todd (Performer) / Morehouse, Daniel (Performer) / Magers, Kristen (Performer) / DeGrow, Gary (Performer) / DeGrow, Richard (Performer) / Women's Chorus (Performer) / Sun Devil Singers (Performer) / ASU Library. Music Library (Publisher)
Created2004-03-24
ContributorsMetz, John (Performer) / Sowers, Richard (Performer) / Collegium Musicum (Performer) / ASU Library. Music Library (Publisher)
Created1983-01-29