The emergence of Internet of Things has created a controversial debate between usability vs. personal security and privacy issues. Feel free to read relevant articles on the Internet on this issue.
Question is attached please. Let me know if you have any questions.
Requirements: per instruction
1. The emergence of Internet of Things has created a controversial debate between usability vs. personal security and privacy issues. Feel free to read relevant articles on the Internet on this issue. Next, comment, in your own words, the impact and implication of the trade-offs between usability and security/privacy in this realm.
2. QUESTION 2
Report requirements
Include your name and assignment title at the top of the document.
Number the questions and answers and answer each question in your submission in sequence.
For each response, include the required text as well as any necessary images and diagrams.
Use black font color for texts
If uploading an MSWord format file, view the uploaded file from Canvas to make sure that the layout of images and texts are not
overlapping in the report. If the contents seem to have moved around, upload a pdf instead of an MSWord file.
Scenario
Consider the application scenario from Module 2 Assignment:
A simple online food pick-up ordering application platform for a restaurant, MCY Fast Food, allows online users to perform the
following actions using the web-based application interface:
Browse through the restaurant’s menu options, corresponding prices, and nutrition information.
Add items using a “add” button to the cart.
View the cart to finalize the order.
Items can be deleted from the cart before proceeding to finalize the order.
Provides all necessary personal user information and pay the total amount due using a credit card gateway.
Receive confirmation email with order details, itemized bill, and approximate pick up time.
The restaurant also receives an email with the order details, itemized bill, and approximate pick up time for the customer.
Questions
1. (15 points) Discuss on the usability and security aspects for the above application scenario based on the Security-Usability
Threat Model.
2. (15 points) Based on the assessment techniques applied for Security-Usability Threat Model, discuss the probable demotivators where users may unknowingly end up breaking the system.
3. (15 points) Based on the assessment techniques applied for Security-Usability Threat Model, discuss the probable motivators
where users may end up performing threat scenarios due to the secure methods being more complicated compared to the regular usage scenarios.
4. (5 points) Discuss, in your opinion, the choices for triggers, warnings, and indicators which can be adopted for the application interface.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
