The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July-Aug. (2011 vol.9)
pp: 64-67
Tara Whalen , Carleton University
ABSTRACT
Computer security and usability are challenging problems that are often interrelated. In harmonizing security and usability, it isn't enough to consider how human factors can be leveraged in support of security. Instead, it's important to take a user-centered perspective, and consider how best to support people in attaining their goals when they use computer systems. This article approaches this problem by highlighting some of the psychological factors and human values that must be considered when creating effective security solutions.
INDEX TERMS
security, usability, usable security, psychology
CITATION
Tara Whalen, "Security as if People Mattered", IEEE Security & Privacy, vol.9, no. 4, pp. 64-67, July-Aug. 2011, doi:10.1109/MSP.2011.92
REFERENCES
1. M.F. Theofanos and S.L. Pfleeger, "Guest Editors' Introduction: Shouldn't All Security Be Usable?" IEEE Security & Privacy, vol. 9, no. 2, 2011, pp. 12–17; http://doi.ieeecomputersociety.org/10.1109 MSP.2011.30.
2. P. Dourish et al., "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem," Personal and Ubiquitous Computing, vol. 8, Nov. 2004, pp. 391–401.
3. J. Johnson, Designing with the Mind in Mind: A Simple Guide to Understanding User Interface Design Rules, Morgan Kaufman Publishers, 2010.
4. B. Friedman, P.H. Kahn Jr., and A. Borning, "Value Sensitive Design and Information Systems," P. Zhang, and D. Galletta eds., Human-Computer Interaction in Management Information Systems: Foundations, M.E. Sharpe, 2006, pp. 348–372.
5. J.H. Saltzer, and M.D. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, vol. 63, Sept. 1975, pp. 1278–1308.
6. T. Bisson, "They're Made Out of Meat," OMNI, vol. 13, Apr. 1991, p. 42; www.terrybisson.com/page6page6.html.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool