Show simple item record

dc.contributor.advisorShaffer, Alan
dc.contributor.advisorGarfinkel, Simson
dc.contributor.authorPotter, Trek C.
dc.dateSep-12
dc.date.accessioned2012-11-14T00:02:58Z
dc.date.available2012-11-14T00:02:58Z
dc.date.issued2012-09
dc.identifier.urihttp://hdl.handle.net/10945/17440
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractTo operate effectively and maintain national security, the DoD relies on the ability to ensure authorized access to information, while protecting that information from unauthorized users. Non-malicious insider threats involving information leakage typically receive little attention, though their impact is significant. This thesis focuses on how the act of file sharing contributes to non-malicious insider threats. Current file sharing methods provide neither the usability users require nor the security the organization requires. Security without usability results in users bypassing securing features, and systems that are usable but not secure are invariably compromised. Therefore, usability and security must be properly aligned to attain true security. Cloud-based file sharing technologies provide promising alternatives for both usable and secure file sharing. As the federal government moves toward the cloud, new programs assess the back-end security of commercially available cloud-based technologies. Building on prior research, this thesis develops a methodology for evaluating the usability and security of cloud-based file sharing technologies from the end-user perspective. This methodology adapts and combines the concepts of heuristics evaluation and cognitive walkthrough. Specifically, the heuristics evaluation assesses whether a cloud-based file sharing technology implements critical usability and security principles, and the cognitive walkthrough determines how usably the principles are implemented. The thesis concludes with a demonstration of how the methodology is conducted. The results of this methodology will assist organizations in properly assessing a technology for official use by DoD.en_US
dc.description.urihttp://archive.org/details/anevaluationmeth1094517440
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.titleAn Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologiesen_US
dc.typeThesisen_US
dc.contributor.secondreaderWelch, William
dc.contributor.departmentInformation Technology Management
dc.subject.authorCloud Computingen_US
dc.subject.authorFile Sharingen_US
dc.subject.authorInsider Threaten_US
dc.subject.authorInformation Assuranceen_US
dc.subject.authorUsabilityen_US
dc.subject.authorHCIen_US
dc.subject.authorHCI-SECen_US
dc.subject.authorHuman Factorsen_US
dc.description.serviceCaptain, United States Air Forceen_US
etd.thesisdegree.nameMaster of Science In Information Technology Managementen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineInformation Technology Managementen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record