Users and Security

Research from Dartmouth College Computer Science regarding users and security:

In real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and improve the activities of human agents in the corresponding non-cyber worlds. However, talking to actual users (instead of just computer security experts) reveals endemic circumvention of the computer-embedded rules. Good-intentioned users, trying to get their jobs done, systematically work around security and other controls embedded in their IT systems.

Source: Mismorphism: a Semiotic Model of Computer Security Circumvention by Sean W. Smith, Ross Koppel, Jim Blythe, Vijay Kothari

, ,

No comments yet.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Leave your opinion here. Please be nice. Your Email address will be kept private.