Computer security impaired by legitimate users - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Computers and Security Année : 2004

Computer security impaired by legitimate users

Résumé

Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in impairing the level of protection. In order to address this issue, we wish to adopt a multidisciplinary standpoint and investigate some of the human aspects involved in computer security. From research in psychology, it is known that people make biased decisions. They sometimes overlook rules in order to gain maximum benefits for the cost of a given action. This situation leads to insidious security lapses whereby the level of protection is traded-off against usability. In this paper, we highlight the cognitive processes underlying such security impairments. At the end of the paper, we propose a short usability-centred set of recommendations.

Domaines

Informatique
Fichier principal
Vignette du fichier
Besnard-Arief-2004--Computer-security-impaired-legal-users.pdf (261.01 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00691818 , version 1 (27-04-2012)

Identifiants

Citer

Denis Besnard, Budi Arief. Computer security impaired by legitimate users. Computers and Security, 2004, 23 (3), pp.Pages 253-264. ⟨10.1016/j.cose.2003.09.002⟩. ⟨hal-00691818⟩
75 Consultations
1011 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More