The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2010 vol.8)
pp: 72-75
Matt Bishop , University of California, Davis
As technology advances, the ways people will interact with the technology changes to reflect the changes in technology. But most people do not care how technology works, but only that it does what it is supposed to do. Requiring them to learn how to secure their systems ensures that the systems will never be secured. Instead, the human element of securing systems must be transformed, along with the system.
securing systems, transforming technology, human factors
Matt Bishop, "Technology, Training, and Transformation", IEEE Security & Privacy, vol.8, no. 5, pp. 72-75, September/October 2010, doi:10.1109/MSP.2010.165
1. K. Koscher et al., "Experimental Security Analysis of a Modern Automobile," Proc. 2010 IEEE Symp. Security and Privacy, IEEE CS Press, 2010, pp. 447–462.
2. T. Hoppe, S. Kiltz, and J. Dittmann, "Security Threats to Automotive CAN Networks—Practical Examples and Selected Short-Term Countermeasures," Proc. 2008 Computer Safety, Reliability, and Security International Conf., Springer-Verlag, 2008, pp. 235–248.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool