This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Technology, Training, and Transformation
September/October 2010 (vol. 8 no. 5)
pp. 72-75
Matt Bishop, University of California, Davis
As technology advances, the ways people will interact with the technology changes to reflect the changes in technology. But most people do not care how technology works, but only that it does what it is supposed to do. Requiring them to learn how to secure their systems ensures that the systems will never be secured. Instead, the human element of securing systems must be transformed, along with the system.

1. K. Koscher et al., "Experimental Security Analysis of a Modern Automobile," Proc. 2010 IEEE Symp. Security and Privacy, IEEE CS Press, 2010, pp. 447–462.
2. T. Hoppe, S. Kiltz, and J. Dittmann, "Security Threats to Automotive CAN Networks—Practical Examples and Selected Short-Term Countermeasures," Proc. 2008 Computer Safety, Reliability, and Security International Conf., Springer-Verlag, 2008, pp. 235–248.

Index Terms:
securing systems, transforming technology, human factors
Citation:
Matt Bishop, "Technology, Training, and Transformation," IEEE Security & Privacy, vol. 8, no. 5, pp. 72-75, Sept.-Oct. 2010, doi:10.1109/MSP.2010.165
Usage of this product signifies your acceptance of the Terms of Use.