Many system security departments treat users as a security risk to be controlled. The general consensus is that most users are careless and unmotivated when it comes to system security. In a recent study, we found that users may indeed compromise computer security mechanisms, such as password authentication, both knowing and unknowingly. A closer analysis, however, revealed that such behavior is often caused by the way in which security mechanisms are implemented, and users ’ lack of knowledge. We argue that to change this state of affairs, security departments need to communicate more with users, and adopt a user-centered design approach
Security and usability are highly important and interdependent quality attributes of modern IT syste...
E ffective security controls are critical for trustworthy opera-tion of large computer systems, whic...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Many system security departments treat users as a security risk to be controlled. The general conse...
In the increasing face of threats in computing world end users often come across with security featu...
Computer security problems often occur when there are disconnects between users' understanding of th...
Security is an interesting area, one in which we may well be guilty of misunderstanding the very peo...
Traditionally, security is only considered as strong as its weakest link, and people were considered...
With all security technologies available to use and benefit from, computer users might wonder why th...
Historically, computer security has its roots in the military domain with its hierarchical structure...
The security of any computer system that is configured\ud and operated by human beings critically de...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Information security breaches is a current serious issue that has been faced by many organizations. ...
Computer security issues have typically been approached from the perspective of building technical c...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
E ffective security controls are critical for trustworthy opera-tion of large computer systems, whic...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...
Many system security departments treat users as a security risk to be controlled. The general conse...
In the increasing face of threats in computing world end users often come across with security featu...
Computer security problems often occur when there are disconnects between users' understanding of th...
Security is an interesting area, one in which we may well be guilty of misunderstanding the very peo...
Traditionally, security is only considered as strong as its weakest link, and people were considered...
With all security technologies available to use and benefit from, computer users might wonder why th...
Historically, computer security has its roots in the military domain with its hierarchical structure...
The security of any computer system that is configured\ud and operated by human beings critically de...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Information security breaches is a current serious issue that has been faced by many organizations. ...
Computer security issues have typically been approached from the perspective of building technical c...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
E ffective security controls are critical for trustworthy opera-tion of large computer systems, whic...
Passwords are our primary form of authentication. Yet passwords are a major vulnerability for compu...