Usable Security Why Do We Need It ? How Do We Get It ?

نویسنده

  • IVAN FLECHAIS
چکیده

ECURITY EXPERTS FREQUENTLY REFER TO PEOPLE AS “THE WEAKEST LINK IN THE CHAIN” OF SYSTEM SECURITY. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range of social engineering techniques. Often, such failures are attributed to users’ carelessness and ignorance. However, more enlightened researchers have pointed out that current security tools are simply too complex for many users, and they have made efforts to improve user interfaces to security tools. In this chapter, we aim to broaden the current perspective, focusing on the usability of security tools (or products) and the process of designing secure systems for the real-world context (the panorama) in which they have to operate. Here we demonstrate how current human factors knowledge and user-centered design principles can help security designers produce security solutions that are effective in practice.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why we need to read and understand literature: literariness and Hans Rosling’s Factfulness (2018)

My article addresses the qualities of “good” literature and how an understanding of the nature of literary devices, so-called “literariness”, can enhance the reading experience. Focusing on Hans Rosling’s Factfulness (2018), I discuss some of the most important features of good writing. Six literary devices have been selected for special attention: point of view, tone, amplification, anecdotes,...

متن کامل

All It Takes for Corruption in Health Systems to Triumph, Is Good People Who Do Nothing; Comment on “We Need to Talk About Corruption in Health Systems”

Numerous investigations demonstrate that the problem of corruption in the health sector is enormous and has grave negative consequences for patients. Nevertheless, the problem of corruption in health systems is far from eminent in the international health policy debate. Hutchinson, Balabanova, and McKee have identifed in their Editorial five reasons why the health policy community has been relu...

متن کامل

Handicrafts, Encountering Modern Technology

This article aimes to emphasize certain points concerning traditional art , and to put forward a question. As the term” Traditional art” is rather ambiguous, first we try to clarify it. To do so, we propose an approach somehow different from one generally admitted. Thereby, we discuss the reasons why it is not so easy to give a definition of traditional art, islamic art in particular, specially...

متن کامل

A Decentralized Online Sortition Protocol

We propose a new online sortition protocol which is decentralized. We argue that our protocol has safety, fairness, randomness, non-reputation and openness properties. Sortition is a process that makes random decision and it is used in competitions and lotteries to determine who is the winner. In the real world, sortition is simply done using a lottery machine and all the participa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005