急 英语好的帮我翻译一下,快又好的在加分 急用 80
3User-centeredperspectivesonsecurityTheuser-centredapproachtosecurityisstillinitsearl...
3 User-centered perspectives on security
The user-centred approach to security is still in its early stages. This approach places the user at the centre of security development. There has been welcome emphasis on aligning security and usability. But when the user is modeled on the developer of security systems, it is the expert user that is considered [6].
There has also been a focus on the psychological dimensions of security. Consequently issues of ease of use and cognitive load have become part of the discussion of security mechanisms. However, for the most part, the literature on user-centered security sees the user as an individual in an organizational context [26]. The literature to date has not adequately taken the social and cultural context into account. There has been some welcome work on the group context in organizations [12], [23] and ‘social translucence’ [1], [11]. But the field needs to expand in two directions. First, the domestic context of individual and shared activities in the household has become important as the Internet becomes a channel for daily activities. Second, these activities and values need to be studied in the field, rather than a lab, so that the social and cultural meaning of activities becomes apparent. As Tognazzini [33] says, "Both students and professors need to do field studies of real people working in real environments" (p. 46). It is only when people are studied in their social contexts rather than unattached individuals that some of the relevant social practices can be identified. The cultural meanings of activities also have to be taken into account. This is particularly true for online financial transactions as money is managed and owned in different ways in various cultures.
There are three strands to the debate. The first is that it is the usefulness of technology for a designated activity rather than technology itself that is at the centre of security. The second is to move from a focus on security to an emphasis on trust. Control and comfort with the transaction, together with a perception that the customer is being
looked after, is essential for trust. The third is the close connection between privacy and the control of personal information. This emphasis on control of personal information connects security, trust, privacy and identity.
能不能智能话点,直接用翻译软件我也会。。。。我的语言表达能力不是很好,才找别人帮忙的,翻译好后在加50分。 展开
The user-centred approach to security is still in its early stages. This approach places the user at the centre of security development. There has been welcome emphasis on aligning security and usability. But when the user is modeled on the developer of security systems, it is the expert user that is considered [6].
There has also been a focus on the psychological dimensions of security. Consequently issues of ease of use and cognitive load have become part of the discussion of security mechanisms. However, for the most part, the literature on user-centered security sees the user as an individual in an organizational context [26]. The literature to date has not adequately taken the social and cultural context into account. There has been some welcome work on the group context in organizations [12], [23] and ‘social translucence’ [1], [11]. But the field needs to expand in two directions. First, the domestic context of individual and shared activities in the household has become important as the Internet becomes a channel for daily activities. Second, these activities and values need to be studied in the field, rather than a lab, so that the social and cultural meaning of activities becomes apparent. As Tognazzini [33] says, "Both students and professors need to do field studies of real people working in real environments" (p. 46). It is only when people are studied in their social contexts rather than unattached individuals that some of the relevant social practices can be identified. The cultural meanings of activities also have to be taken into account. This is particularly true for online financial transactions as money is managed and owned in different ways in various cultures.
There are three strands to the debate. The first is that it is the usefulness of technology for a designated activity rather than technology itself that is at the centre of security. The second is to move from a focus on security to an emphasis on trust. Control and comfort with the transaction, together with a perception that the customer is being
looked after, is essential for trust. The third is the close connection between privacy and the control of personal information. This emphasis on control of personal information connects security, trust, privacy and identity.
能不能智能话点,直接用翻译软件我也会。。。。我的语言表达能力不是很好,才找别人帮忙的,翻译好后在加50分。 展开
4个回答
展开全部
3 User-centered perspectives on security
The user-centred approach to security is still in its early stages. This approach places the user at the centre of security development. There has been welcome emphasis on aligning security and usability. But when the user is modeled on the developer of security systems, it is the expert user that is considered [6].
There has also been a focus on the psychological dimensions of security. Consequently issues of ease of use and cognitive load have become part of the discussion of security mechanisms. However, for the most part, the literature on user-centered security sees the user as an individual in an organizational context [26]. The literature to date has not adequately taken the social and cultural context into account. There has been some welcome work on the group context in organizations [12], [23] and ‘social translucence’ [1], [11]. But the field needs to expand in two directions. First, the domestic context of individual and shared activities in the household has become important as the Internet becomes a channel for daily activities. Second, these activities and values need to be studied in the field, rather than a lab, so that the social and cultural meaning of activities becomes apparent. As Tognazzini [33] says, "Both students and professors need to do field studies of real people working in real environments" (p. 46). It is only when people are studied in their social contexts rather than unattached individuals that some of the relevant social practices can be identified. The cultural meanings of activities also have to be taken into account. This is particularly true for online financial transactions as money is managed and owned in different ways in various cultures.
There are three strands to the debate. The first is that it is the usefulness of technology for a designated activity rather than technology itself that is at the centre of security. The second is to move from a focus on security to an emphasis on trust. Control and comfort with the transaction, together with a perception that the customer is being
looked after, is essential for trust. The third is the close connection between privacy and the control of personal information. This emphasis on control of personal information connects security, trust, privacy and identity.
三日以用户为中心的角度,对安全
用户为本的工作方针,以安全,目前仍处于早期阶段。这一办法的地方,用户在该中心的安全性开发。一直欢迎侧重于对齐的安全性和可用性。但是,当用户是仿效了开发商的保安系统,它是专家,用户被认为是[ 6 ] 。
也有侧重于心理层面的安全。因此问题的易用性和认知负荷已成为讨论的一部分的安全机制。然而,在大多数情况下,文献上以用户为中心的安全视用户作为一个个人,在一个组织背景[ 26 ] 。文献迄今未能充分考虑社会和文化背景的考虑。有一些欢迎的工作,对集团的背景下,在组织[ 12 ] , [ 23 ]和'社会translucence ' [ 1 ] , [ 11 ] 。但外地需求,以扩大在两个方向。首先,国内的个人的和共享的活动,在家庭中,已成为重要的,因为在互联网上成为一个渠道,为日常活动。其次,这些活动和价值观念有必要加以研究,在这一领域,而不是一个实验室,使社会和文化意义的活动,变得很明显了。作为tognazzini [ 33 ]说, "这两个学生和教授们需要做实地调查研究的实际工作的人,在现实环境中的" (第46页) 。它是只有当人们都在研究他们的社会背景,而不是独立的个人,一些相关的社会实践中可以被认出。文化意义的活动,也必须加以考虑。这一点尤其适用于网上金融交易的钱是管理和国有不同的方式在不同的文化。
有3个方向进行,以辩论。第一个问题是,它是有用的技术,用于指定的活动,而不是技术本身即是在该中心的安全。二是从侧重于安全为重点的信任。控制和舒适性与交易,再加上一种看法认为,顾客正
期待后,是必不可少的信任。三是要紧密结合之间的隐私和控制您的个人信息。这侧重于控制个人信息的连接,安全,信任,隐私和身份。
对不起,有几个我不会翻译.
The user-centred approach to security is still in its early stages. This approach places the user at the centre of security development. There has been welcome emphasis on aligning security and usability. But when the user is modeled on the developer of security systems, it is the expert user that is considered [6].
There has also been a focus on the psychological dimensions of security. Consequently issues of ease of use and cognitive load have become part of the discussion of security mechanisms. However, for the most part, the literature on user-centered security sees the user as an individual in an organizational context [26]. The literature to date has not adequately taken the social and cultural context into account. There has been some welcome work on the group context in organizations [12], [23] and ‘social translucence’ [1], [11]. But the field needs to expand in two directions. First, the domestic context of individual and shared activities in the household has become important as the Internet becomes a channel for daily activities. Second, these activities and values need to be studied in the field, rather than a lab, so that the social and cultural meaning of activities becomes apparent. As Tognazzini [33] says, "Both students and professors need to do field studies of real people working in real environments" (p. 46). It is only when people are studied in their social contexts rather than unattached individuals that some of the relevant social practices can be identified. The cultural meanings of activities also have to be taken into account. This is particularly true for online financial transactions as money is managed and owned in different ways in various cultures.
There are three strands to the debate. The first is that it is the usefulness of technology for a designated activity rather than technology itself that is at the centre of security. The second is to move from a focus on security to an emphasis on trust. Control and comfort with the transaction, together with a perception that the customer is being
looked after, is essential for trust. The third is the close connection between privacy and the control of personal information. This emphasis on control of personal information connects security, trust, privacy and identity.
三日以用户为中心的角度,对安全
用户为本的工作方针,以安全,目前仍处于早期阶段。这一办法的地方,用户在该中心的安全性开发。一直欢迎侧重于对齐的安全性和可用性。但是,当用户是仿效了开发商的保安系统,它是专家,用户被认为是[ 6 ] 。
也有侧重于心理层面的安全。因此问题的易用性和认知负荷已成为讨论的一部分的安全机制。然而,在大多数情况下,文献上以用户为中心的安全视用户作为一个个人,在一个组织背景[ 26 ] 。文献迄今未能充分考虑社会和文化背景的考虑。有一些欢迎的工作,对集团的背景下,在组织[ 12 ] , [ 23 ]和'社会translucence ' [ 1 ] , [ 11 ] 。但外地需求,以扩大在两个方向。首先,国内的个人的和共享的活动,在家庭中,已成为重要的,因为在互联网上成为一个渠道,为日常活动。其次,这些活动和价值观念有必要加以研究,在这一领域,而不是一个实验室,使社会和文化意义的活动,变得很明显了。作为tognazzini [ 33 ]说, "这两个学生和教授们需要做实地调查研究的实际工作的人,在现实环境中的" (第46页) 。它是只有当人们都在研究他们的社会背景,而不是独立的个人,一些相关的社会实践中可以被认出。文化意义的活动,也必须加以考虑。这一点尤其适用于网上金融交易的钱是管理和国有不同的方式在不同的文化。
有3个方向进行,以辩论。第一个问题是,它是有用的技术,用于指定的活动,而不是技术本身即是在该中心的安全。二是从侧重于安全为重点的信任。控制和舒适性与交易,再加上一种看法认为,顾客正
期待后,是必不可少的信任。三是要紧密结合之间的隐私和控制您的个人信息。这侧重于控制个人信息的连接,安全,信任,隐私和身份。
对不起,有几个我不会翻译.
展开全部
三日以用户为中心的角度,对安全
用户为本的工作方针,以安全,目前仍处于早期阶段。这一办法的地方,用户在该中心的安全性开发。一直欢迎侧重于对齐的安全性和可用性。但是,当用户是仿效了开发商的保安系统,它是专家,用户被认为是[ 6 ] 。
也有侧重于心理层面的安全。因此问题的易用性和认知负荷已成为讨论的一部分的安全机制。然而,在大多数情况下,文献上以用户为中心的安全视用户作为一个个人,在一个组织背景[ 26 ] 。文献迄今未能充分考虑社会和文化背景的考虑。有一些欢迎的工作,对集团的背景下,在组织[ 12 ] , [ 23 ]和'社会translucence ' [ 1 ] , [ 11 ] 。但外地需求,以扩大在两个方向。首先,国内的个人的和共享的活动,在家庭中,已成为重要的,因为在互联网上成为一个渠道,为日常活动。其次,这些活动和价值观念有必要加以研究,在这一领域,而不是一个实验室,使社会和文化意义的活动,变得很明显了。作为tognazzini [ 33 ]说, "这两个学生和教授们需要做实地调查研究的实际工作的人,在现实环境中的" (第46页) 。它是只有当人们都在研究他们的社会背景,而不是独立的个人,一些相关的社会实践中可以被认出。文化意义的活动,也必须加以考虑。这一点尤其适用于网上金融交易的钱是管理和国有不同的方式在不同的文化。
有3个方向进行,以辩论。第一个问题是,它是有用的技术,用于指定的活动,而不是技术本身即是在该中心的安全。二是从侧重于安全为重点的信任。控制和舒适性与交易,再加上一种看法认为,顾客正
期待后,是必不可少的信任。三是要紧密结合之间的隐私和控制您的个人信息。这侧重于控制个人信息的连接,安全,信任,隐私和身份。
用户为本的工作方针,以安全,目前仍处于早期阶段。这一办法的地方,用户在该中心的安全性开发。一直欢迎侧重于对齐的安全性和可用性。但是,当用户是仿效了开发商的保安系统,它是专家,用户被认为是[ 6 ] 。
也有侧重于心理层面的安全。因此问题的易用性和认知负荷已成为讨论的一部分的安全机制。然而,在大多数情况下,文献上以用户为中心的安全视用户作为一个个人,在一个组织背景[ 26 ] 。文献迄今未能充分考虑社会和文化背景的考虑。有一些欢迎的工作,对集团的背景下,在组织[ 12 ] , [ 23 ]和'社会translucence ' [ 1 ] , [ 11 ] 。但外地需求,以扩大在两个方向。首先,国内的个人的和共享的活动,在家庭中,已成为重要的,因为在互联网上成为一个渠道,为日常活动。其次,这些活动和价值观念有必要加以研究,在这一领域,而不是一个实验室,使社会和文化意义的活动,变得很明显了。作为tognazzini [ 33 ]说, "这两个学生和教授们需要做实地调查研究的实际工作的人,在现实环境中的" (第46页) 。它是只有当人们都在研究他们的社会背景,而不是独立的个人,一些相关的社会实践中可以被认出。文化意义的活动,也必须加以考虑。这一点尤其适用于网上金融交易的钱是管理和国有不同的方式在不同的文化。
有3个方向进行,以辩论。第一个问题是,它是有用的技术,用于指定的活动,而不是技术本身即是在该中心的安全。二是从侧重于安全为重点的信任。控制和舒适性与交易,再加上一种看法认为,顾客正
期待后,是必不可少的信任。三是要紧密结合之间的隐私和控制您的个人信息。这侧重于控制个人信息的连接,安全,信任,隐私和身份。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
对安全的3个用户被集中的透视
The用户集中了方法对安全仍然进入它的早期。 这种方法安置用户在安全发展的中心。 有对排列的安全和实用性的受欢迎的重点。 但是,当用户在保安系统时开发商被塑造,它是被考虑的专家的用户。
那些也是在心理维度的一个焦点安全。 结果易用和认知量的问题有关于安全机制的讨论的成为的部分。 然而,至于大部分,在用户被集中的安全的文学看见用户作为一个个体在组织上下文[26]。 文学未充分地迄今考虑社会和文化背景。 有在小组上下文的一些受欢迎的工作组织的,和‘半透明的社会’ [1], [11]。 但是领域在二个方向需要扩展。 首先,个体国内上下文和在家庭的共有的活动变得重要,虽然互联网变得每日活动的一种渠道。 其次,这些活动和价值在领域需要被学习,而不是实验室,因此活动的社会和文化意思变得明显。 当Tognazzini说, “学生和教授需要做工作在真实的环境里的真正的人民的现场研究”。 是只有人们在他们的社会环境被学习而不是独立的个体某些相关的社会实践可以被辨认。 活动的文化意思必须也被考虑到。 因为金钱被处理并且拥有用不同的方式以各种各样的文化,这是特别可靠对于网上财务往来。
There是三条子线对辩论。 第一是它是技术的有用性选定的活动的而不是在安全的中心的技术。 第二是从在安全的一个焦点移动向对信任的重点。 与交易的控制和舒适,与悟性一起顾客是 被照看的,对信任是重要的。 三是保密性和个人信息之间控制的密切关系。 对个人信息控制的这重点连接安全、信任、保密性和身分。
The用户集中了方法对安全仍然进入它的早期。 这种方法安置用户在安全发展的中心。 有对排列的安全和实用性的受欢迎的重点。 但是,当用户在保安系统时开发商被塑造,它是被考虑的专家的用户。
那些也是在心理维度的一个焦点安全。 结果易用和认知量的问题有关于安全机制的讨论的成为的部分。 然而,至于大部分,在用户被集中的安全的文学看见用户作为一个个体在组织上下文[26]。 文学未充分地迄今考虑社会和文化背景。 有在小组上下文的一些受欢迎的工作组织的,和‘半透明的社会’ [1], [11]。 但是领域在二个方向需要扩展。 首先,个体国内上下文和在家庭的共有的活动变得重要,虽然互联网变得每日活动的一种渠道。 其次,这些活动和价值在领域需要被学习,而不是实验室,因此活动的社会和文化意思变得明显。 当Tognazzini说, “学生和教授需要做工作在真实的环境里的真正的人民的现场研究”。 是只有人们在他们的社会环境被学习而不是独立的个体某些相关的社会实践可以被辨认。 活动的文化意思必须也被考虑到。 因为金钱被处理并且拥有用不同的方式以各种各样的文化,这是特别可靠对于网上财务往来。
There是三条子线对辩论。 第一是它是技术的有用性选定的活动的而不是在安全的中心的技术。 第二是从在安全的一个焦点移动向对信任的重点。 与交易的控制和舒适,与悟性一起顾客是 被照看的,对信任是重要的。 三是保密性和个人信息之间控制的密切关系。 对个人信息控制的这重点连接安全、信任、保密性和身分。
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询