21st Annual Computer Security Applications Conference (ACSAC'05)
DOI: 10.1109/csac.2005.60
|View full text |Cite
|
Sign up to set email alerts
|

User-Centered Security: Stepping Up to the Grand Challenge

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
37
0

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(38 citation statements)
references
References 30 publications
1
37
0
Order By: Relevance
“…These limitations can lead to "failures" of automation that are not only technical (i.e., when the automation system simply stops working, for example), but are also failures of meeting the actual needs of the users. We further contend that such failures to meet users' needs are not simply annoying nuisances, but rather are at the heart of many of the problems described under the rubric of "usable security" [53]. We therefore ask, "To what extent is it appropriate to automate security for end-users?…”
Section: Introductionmentioning
confidence: 99%
“…These limitations can lead to "failures" of automation that are not only technical (i.e., when the automation system simply stops working, for example), but are also failures of meeting the actual needs of the users. We further contend that such failures to meet users' needs are not simply annoying nuisances, but rather are at the heart of many of the problems described under the rubric of "usable security" [53]. We therefore ask, "To what extent is it appropriate to automate security for end-users?…”
Section: Introductionmentioning
confidence: 99%
“…This is particularly true when the user is part of a larger organizational structure involving a variety of users where the overall organizational security is at stake [8]. Also, since it is the user who will be deploying and using the technical solutions and preventive measures that are in place, a system cannot be protected through considering technical solutions in isolation [9], [10], [11], [12]. For addressing user-related security issues, user awareness has been observed to be a key factor [2], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…For the user to be able to apply security in their day-to-day activities, they need to understand security in their own context of use. In [3] the author points to the need to understand user behavior in terms of security in order to improve the security of a system. Further, the author argues that phrasing the system security requirements in terms of user mental models can be beneficial, but that there is no framework that could be applied to achieve such goals.…”
Section: Introductionmentioning
confidence: 99%