메뉴 건너뛰기




Volumn 23, Issue 3, 2004, Pages 253-264

Computer security impaired by legitimate users

Author keywords

Cognitive psychology; Computer security; Cost benefit trade offs; Risk; Work practices

Indexed keywords

BEHAVIORAL RESEARCH; COST BENEFIT ANALYSIS; ELECTRONIC COMMERCE; INFORMATION TECHNOLOGY; MONITORING; ONLINE SYSTEMS; PROFESSIONAL ASPECTS; RISKS; USER INTERFACES;

EID: 2342598277     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2003.09.002     Document Type: Article
Times cited : (101)

References (64)
  • 2
    • 0007141905 scopus 로고    scopus 로고
    • Privacy issues in ubiquitous multimedia environments: Wake sleeping dogs or let them lie?
    • A. Sasse, & C. Johnson. Amsterdam: IOS Press
    • Adams A., Sasse M.A. Privacy issues in ubiquitous multimedia environments: wake sleeping dogs or let them lie? Sasse A., Johnson C. Human computer interaction - INTERACT'99. 1999;214-221 IOS Press, Amsterdam.
    • (1999) Human Computer Interaction - INTERACT'99 , pp. 214-221
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams A., Sasse M.A. Users are not the enemy. Commun ACM. 42:1999;41-46.
    • (1999) Commun ACM , vol.42 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 7
    • 2342608352 scopus 로고    scopus 로고
    • Viruses: Preparing for the onslaught
    • Armstrong I. Viruses: preparing for the onslaught. Secure Comput. (May):2001;24-30.
    • (2001) Secure Comput , Issue.MAY , pp. 24-30
    • Armstrong, I.1
  • 12
    • 2342549539 scopus 로고    scopus 로고
    • Does size matter? 2002 survey
    • Briney A., Prince F. Does size matter? 2002 survey. Inf Secur. (September):2002.
    • (2002) Inf Secur , Issue.SEPTEMBER
    • Briney, A.1    Prince, F.2
  • 13
    • 0003429117 scopus 로고    scopus 로고
    • Are passfaces more usable than passwords? People and computers-XIV usability or else!
    • Sunderland, UK
    • Brostoff S, Sasse MA. Are passfaces more usable than passwords? People and Computers-XIV Usability or Else! Proceedings of HCI2000, Sunderland, UK; 2000. p. 405-24.
    • (2000) Proceedings of HCI2000 , pp. 405-424
    • Brostoff, S.1    Sasse, M.A.2
  • 15
    • 2342553334 scopus 로고    scopus 로고
    • Ten strikes and you're out: Increasing the number of login attempts can improve password usability
    • Fort Lauderdale, Florida
    • Brostoff S, Sasse MA. Ten strikes and you're out: increasing the number of login attempts can improve password usability. Proceedings of CHI 2003 Workshop on HCI and Security Systems, Fort Lauderdale, Florida; 2003.
    • (2003) Proceedings of CHI 2003 Workshop on HCI and Security Systems
    • Brostoff, S.1    Sasse, M.A.2
  • 16
    • 0005277359 scopus 로고
    • La réutilisation en génie logiciel: Une définition d'un cadre de recherche en ergonomie cognitive
    • Bayonne, France
    • Burkardt J-M, Detienne F. La réutilisation en génie logiciel: une définition d'un cadre de recherche en ergonomie cognitive. Proceedings of ErgoIA 94, Bayonne, France; 1994. p. 83-95.
    • (1994) Proceedings of ErgoIA 94 , pp. 83-95
    • Burkardt, J.-M.1    Detienne, F.2
  • 18
    • 2342497078 scopus 로고    scopus 로고
    • Southampton, PA: Computer Security Institute
    • CSI/FBI. Computer crime and security survey. 2003;Computer Security Institute, Southampton, PA. Available from: http://www.gocsi.com/forms/fbi/pdf. html.
    • (2003) Computer Crime and Security Survey
  • 20
    • 0038300439 scopus 로고    scopus 로고
    • Failure to adapt or adaptations that fail: Contrasting models on procedures and safety
    • Dekker S. Failure to adapt or adaptations that fail: contrasting models on procedures and safety. Appl Ergon. 34:2003;233-238.
    • (2003) Appl Ergon , vol.34 , pp. 233-238
    • Dekker, S.1
  • 24
    • 0028815918 scopus 로고
    • General practitioners' tacit and stated policies in the prescription of lipid lowering agents
    • Evans S.B.T., Harries C., Dennis I., Dean I. General practitioners' tacit and stated policies in the prescription of lipid lowering agents. Br J Gen Pract. 45:1995;15-18.
    • (1995) Br J Gen Pract , vol.45 , pp. 15-18
    • Evans, S.B.T.1    Harries, C.2    Dennis, I.3    Dean, I.4
  • 25
    • 2342546921 scopus 로고    scopus 로고
    • Summary of workshop WS9 held at OT 2003, Cambridge, UK, March
    • Flechais I, Sasse MA. Developing secure and usable software. Summary of workshop WS9 held at OT 2003, Cambridge, UK, March 2003. Available from: http://www.cs.ucl.ac.uk/staff/I.Flechais/downloads/oct2003.pdf.
    • (2003) Developing Secure and Usable Software
    • Flechais, I.1    Sasse, M.A.2
  • 27
    • 2342659451 scopus 로고    scopus 로고
    • Actualities need to be captured
    • Fujita Y. Actualities need to be captured. Cogn Technol Work. 2:2000;212-214.
    • (2000) Cogn Technol Work , vol.2 , pp. 212-214
    • Fujita, Y.1
  • 29
    • 0022746620 scopus 로고
    • The integration of computing and routine work
    • Gasser L. The integration of computing and routine work. ACM Trans Off Inf Syst. 4:1986;205-225.
    • (1986) ACM Trans Off Inf Syst , vol.4 , pp. 205-225
    • Gasser, L.1
  • 31
    • 2342550930 scopus 로고    scopus 로고
    • Gnuftp Compromise. ftp://ftp.gnu.org/MISSING-FILES.README:2003;
    • (2003)
  • 36
    • 0009968230 scopus 로고
    • Diagnostic et prise de décision dans les situations dynamiques
    • Hoc J.-M., Amalberti R. Diagnostic et prise de décision dans les situations dynamiques. Psychologie Française. 39:1994;177-192.
    • (1994) Psychologie Française , vol.39 , pp. 177-192
    • Hoc, J.-M.1    Amalberti, R.2
  • 40
    • 0028516213 scopus 로고
    • High pressure steam engines and computer software
    • Leveson N. High pressure steam engines and computer software. IEEE Comput. 10:1994;65-73.
    • (1994) IEEE Comput , vol.10 , pp. 65-73
    • Leveson, N.1
  • 41
    • 0023440413 scopus 로고
    • Commentary: Models of the decision maker in unforeseen accidents
    • Mancini G. Commentary: models of the decision maker in unforeseen accidents. Int J Man Mach Stud. 27:1987;631-639.
    • (1987) Int J Man Mach Stud , vol.27 , pp. 631-639
    • Mancini, G.1
  • 45
    • 2342549538 scopus 로고    scopus 로고
    • NetworkAssociates. W32/Deloder.worm. http://vil.nai.com/vil/content/ v_100127.htm.
    • W32/Deloder.worm
  • 48
    • 0004223940 scopus 로고
    • Cambridge University Press
    • Reason J. Human error. 1990;Cambridge University Press.
    • (1990) Human Error
    • Reason, J.1
  • 49
    • 2342555494 scopus 로고    scopus 로고
    • The COTS question is one of evidence
    • Redmill F. The COTS question is one of evidence. Saf Syst. 10:2001;8-10.
    • (2001) Saf Syst , vol.10 , pp. 8-10
    • Redmill, F.1
  • 50
    • 2342491289 scopus 로고    scopus 로고
    • Some dimensions of risk not often considered by engineers
    • Redmill F. Some dimensions of risk not often considered by engineers. J Syst Saf. Q4:2002;22-40.
    • (2002) J Syst Saf , vol.Q4 , pp. 22-40
    • Redmill, F.1
  • 52
    • 0033703266 scopus 로고    scopus 로고
    • The reuse of knowledge: A user-centered approach
    • Richards D. The reuse of knowledge: a user-centered approach. Int J Hum Comput Stud. 52:2000;553-579.
    • (2000) Int J Hum Comput Stud , vol.52 , pp. 553-579
    • Richards, D.1
  • 53
    • 2342667933 scopus 로고    scopus 로고
    • Computer security: Anatomy of a usability disaster, and a plan for recovery
    • Fort Lauderdale, Florida
    • Sasse A. Computer security: anatomy of a usability disaster, and a plan for recovery. Proceedings of CHI 2003 Workshop on HCI and Security Systems, Fort Lauderdale, Florida; 2003.
    • (2003) Proceedings of CHI 2003 Workshop on HCI and Security Systems
    • Sasse, A.1
  • 54
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the weakest link - A human computer interaction approach to usable effective security
    • Sasse M.A., Brostoff S., Weirich D. Transforming the weakest link - a human computer interaction approach to usable effective security. BT Technol J. 19:2001;122-131.
    • (2001) BT Technol J , vol.19 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 57
    • 0028408226 scopus 로고
    • The influence of decision aids on choice strategies under conditions of high cognitive load
    • Todd P.A., Bensabat I. The influence of decision aids on choice strategies under conditions of high cognitive load. IEEE Trans Syst Man Cybernet. 24:1994;537-547.
    • (1994) IEEE Trans Syst Man Cybernet , vol.24 , pp. 537-547
    • Todd, P.A.1    Bensabat, I.2
  • 58
    • 0031488541 scopus 로고    scopus 로고
    • Modèle de l'opérateur et modèle du prescripteur. Le cas des consignes de résolution de situations incidentelles pour les conducteurs de trains
    • Veyrac H., Cellier J.-M., Bertrand A. Modèle de l'opérateur et modèle du prescripteur. Le cas des consignes de résolution de situations incidentelles pour les conducteurs de trains. Le Travail Humain. 60:1997;387-407.
    • (1997) Le Travail Humain , vol.60 , pp. 387-407
    • Veyrac, H.1    Cellier, J.-M.2    Bertrand, A.3
  • 59
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: A first step towards effective password security in the real world
    • Cloudcroft, NM
    • Weirich D, Sasse MA. Pretty good persuasion: a first step towards effective password security in the real world. Proceedings of New Security Paradigms Workshop, Cloudcroft, NM; 2002. p. 137-44.
    • (2002) Proceedings of New Security Paradigms Workshop , pp. 137-144
    • Weirich, D.1    Sasse, M.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.