The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2008 vol.12)
pp: 10-12
Elizabeth Churchill , Yahoo! Research
Les Nelson , Palo Alto Research Center
Diana K. Smetters , Palo Alto Research Center
ABSTRACT
Usability is a growing concern in designing systems and applications that operate securely. Most usability work has focused on improving user interfaces, but security is systemic, and negotiating, instituting, and maintaining real-world security procedures and practices is an organizational and social activity.
INDEX TERMS
security, useful security, usability, secure user interfaces, social computing
CITATION
Elizabeth Churchill, Les Nelson, Diana K. Smetters, "Useful Computer Security", IEEE Internet Computing, vol.12, no. 3, pp. 10-12, May/June 2008, doi:10.1109/MIC.2008.67
REFERENCES
1. P. Dourish et al., "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem," Personal and Ubiquitous Computing, vol. 8, 2004, pp. 391–401.
2. S.E. Madnick et al., "The House of Security: Stakeholder Perceptions of Security Assessment and Importance," MIT Sloan research paper no. 4662-07, July 2007; http://ssrn.comabstract=1012426.
3. K.P. Yee, "Aligning Security and Usability," IEEE Security and Privacy, vol. 2, no. 5, 2004, pp. 48–55.
4. T.N. Jagatic et al., "Social Phishing," Comm. ACM, vol. 50, no. 10, 2007, pp. 94–100; http://doi.acm.org/10.11451290958.1290968 .
5. T. Whalen and K.M. Inkpen, "Gathering Evidence: Use of Visual Security Cues in Web Browsers," Proc. Graphics Interface, ACM Press, 2005, pp. 137–144.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool