The Community for Technology Leaders
RSS Icon
Issue No.05 - Sept.-Oct. (2012 vol.10)
pp: 75-78
Sean W. Smith , Dartmouth College
It's hard to create and configure security technology and hard to use it after deployment. However, the human mind is a component in both security creation and use. While we technologists have spent the last 40 years building fancier machines, psychologists have spent those decades documenting ways in which human minds systematically (and predictably) misperceive things. To what extent might cognitive bias affect the usable security problem?
Cognitive informatics, Computer security, Behavioral science, Human factors, Psychology, cognitive bias, usable security
Sean W. Smith, "Security and Cognitive Bias: Exploring the Role of the Mind", IEEE Security & Privacy, vol.10, no. 5, pp. 75-78, Sept.-Oct. 2012, doi:10.1109/MSP.2012.126
1. E. Protalinksi, “Mom Accessed School System 110 Times to Change Kids' Grades,” ZDNet, 19 July 2012; www.zdnet.commom-accessed-school-system-110-times-to-change-kids-grades-7000001230 .
2. R.K. Hastie and R.M. Dawes, Rational Choice in an Uncertain World: The Psychology of Judgment and Decision Making, 2nd ed., Sage, 2009.
3. R.F. Pohl, Cognitive Illusions: A Handbook on Fallacies and Biases in Thinking, Judgement and Memory, Psychology Press, 2005.
4. D. Gilbert, Stumbling on Happiness, Vintage Books, 2007.
5. D. Kahneman, Thinking, Fast and Slow, Farrar, Straus and Giroux, 2011.
6. T.D. Wilson and J.W. Schooler, “Thinking Too Much: Introspection Can Reduce the Quality of Preferences and Decisions,” J. Personality and Social Psychology, vol. 60, no. 2, 1991, pp. 181–192.
7. S. Trudeau, S. Sinclair, and S. Smith, “The Effects of Introspection on Creating Privacy Policy,” Proc. 8th ACM Workshop on Privacy in the Electronic Society (WPES 09), ACM, 2008, pp. 1–10.
8. E.W. Dunn and S.A. Laham, “Affective Forecasting: A User's Guide to Emotional Time Travel,” Affect in Social Thinking and Behavior, J. Forgas ed., Psychology Press, 2006.
9. E. Pronin, C. Olivola, and K. Kennedy, “Doing unto Future Selves as You Would Do unto Others: Psychological Distance and Decision Making,” Personality and Social Psychology Bulletin, vol. 34, no. 2, 2007, pp. 224–237.
10. L. Van Boven, D. Dunning, and G. Loewenstein, “Egocentric Empathy Gaps between Owners and Buyers: Misperceptions of the Endowment Effect” J. Personality and Social Psychology, vol. 79, no. 1, 2000, pp. 66–76.
11. Y. Wang, S.W. Smith, and A. Gettinger, “Access Control Hygiene and the Empathy Gap in Medical IT,” HealthSec, Usenix Assoc., 2012; access-control-hygiene-and-empathy-gap-medical-it .
12. J. Pita et al., “Effective Solutions for Real-World Stackelberg Games: When Agents Must Deal with Human Uncertainties,” Proc. 8th Int'l Conf. Autonomous Agents and Multiagent Systems, Int'l Foundation for Autonomous Agents and Multiagent Systems, 2009, .
13. R. Yang et al., “Improving Resource Allocation Strategy against Human Adversaries in Security Games,” Int'l Joint Conf. Artificial Intelligence (IJCAI 11), AAAI, 2011; .
14. E. Diener, D. Wirtz, and S. Oishi, “End Effects of Rated Life Quality: The James Dean Effect,” Psychological Science, vol. 12, no. 2, 2001, pp. 124–128.
15. D. Gilbert et al., “The Peculiar Longevity of Things Not So Bad,” Psychological Science, vol. 15, no. 1, 2004, pp. 14–19.
16. D.T. Gilbert and T.D. Wilson, “Why the Brain Talks to Itself: Sources of Error in Emotional Prediction,” Philosophical Trans. Royal Soc. B, vol. 364, no. 1521, 2009, pp. 1335–1341.
17. S.J. Handley and J. Evans, “Supposition and Representation in Human Reasoning,” Thinking and Reasoning, vol. 6, no. 4, 2000, pp. 273–311.
18. J. Haidt, “The Emotional Dog and Its Rational Tail: A Social Intuitionist Approach to Moral Judgment,” Psychological Rev., vol. 108, no. 4, 2001, pp. 814–834.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool