Research fromÂ Dartmouth College Computer Science regarding users and security:
In real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and improve the activities of human agents in the corresponding non-cyber worlds. However, talking to actual users (instead of just computer security experts) reveals endemic circumvention of the computer-embedded rules. Good-intentioned users, trying to get their jobs done, systematically work around security and other controls embedded in their IT systems.
Source:Â Mismorphism: a Semiotic Model of Computer Security CircumventionÂ byÂ Sean W. Smith, Ross Koppel, Jim Blythe, Vijay Kothari