메뉴 건너뛰기




Volumn 6, Issue 2, 2008, Pages 24-29

The seven flaws of identity management: Usability and security challenges

Author keywords

Identity management; Privacy; Usability

Indexed keywords

IDENTITY MANAGEMENT; INFORMATION LEAKAGE;

EID: 41949139623     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.49     Document Type: Article
Times cited : (137)

References (20)
  • 1
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and Rationality in Decision Making
    • A. Acquisti and J. Grossklags, "Privacy and Rationality in Decision Making," IEEE Security & Privacy, vol. 3, no. 1, 2005, pp. 26-33.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 3
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures
    • A. Adams and M.A. Sasse, "Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures," Comm. ACM, vol. 42, no. 12, 1999, pp. 40-46.
    • (1999) Comm. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 5
    • 41949087245 scopus 로고    scopus 로고
    • McAfee-NCSA Online Safety Study, Oct. 2007; www.staysafeonline.info/news/ ainericanslackprotection.html.
    • McAfee-NCSA Online Safety Study, Oct. 2007; www.staysafeonline.info/news/ ainericanslackprotection.html.
  • 6
    • 41949140178 scopus 로고    scopus 로고
    • AOL/NCSA Online Safety Study, Dec. 2005; www.staysafeonline.info/pdf/ safety_study_2005.pdf.
    • AOL/NCSA Online Safety Study, Dec. 2005; www.staysafeonline.info/pdf/ safety_study_2005.pdf.
  • 8
    • 85084161493 scopus 로고    scopus 로고
    • Déjà Vu: A User Study-Using Images for Authentication
    • Usenix Assoc
    • R. Dhamija and A. Perrig, "Déjà Vu: A User Study-Using Images for Authentication," Proc. 9th Usenix Security Symp., Usenix Assoc., 2000, pp. 45-58.
    • (2000) Proc. 9th Usenix Security Symp , pp. 45-58
    • Dhamija, R.1    Perrig, A.2
  • 10
    • 41949107094 scopus 로고    scopus 로고
    • K. Cameron, Laws of Identity, blog, May 2005; w w.identityblog.com/stories/2004/12/09/thelaws.html.
    • K. Cameron, "Laws of Identity," blog, May 2005; w w.identityblog.com/stories/2004/12/09/thelaws.html.
  • 11
    • 41949104992 scopus 로고    scopus 로고
    • blog, 19 June
    • E. Maler, "r-e-s-p-e-c-t," blog, 19 June 2006; www.xinlgrrl.com/blog/archives/2006/06/19/r-e-s-p-e-c-t/.
    • (2006) r-e-s-p-e-c-t
    • Maler, E.1
  • 12
    • 77953767524 scopus 로고    scopus 로고
    • Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware
    • ACM Press
    • N. Good et al., "Stopping Spyware at the Gate: A User Study of Privacy, Notice, and Spyware," Proc. Symp. Usable Privacy and Security (SOUPS 05), ACM Press, 2005, pp. 43-52.
    • (2005) Proc. Symp. Usable Privacy and Security (SOUPS 05) , pp. 43-52
    • Good, N.1
  • 13
    • 38549085605 scopus 로고    scopus 로고
    • Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers
    • Proc. Usable Security USEC 07, Springer
    • J. Grossklags and N. Good, "Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers," Proc. Usable Security (USEC 07), Lecture Notes in Computer Science, Springer, 2007.
    • (2007) Lecture Notes in Computer Science
    • Grossklags, J.1    Good, N.2
  • 14
    • 41949088647 scopus 로고    scopus 로고
    • Attention Switch and Maintenance
    • M.S. Wogalter, ed, Lawrence Erlbaum Assoc
    • M.S. Wogalter and W.J. Vigilante, "Attention Switch and Maintenance," Handbook of Warnings, M.S. Wogalter, ed., Lawrence Erlbaum Assoc., 2006, pp. 245-265.
    • (2006) Handbook of Warnings , pp. 245-265
    • Wogalter, M.S.1    Vigilante, W.J.2
  • 15
    • 0020112113 scopus 로고
    • Design Rules Based on Analyses of Human Error
    • D.A. Norman, Design Rules Based on Analyses of Human Error," Comm. ACM, vol. 26, no. 4, 1983, pp. 254-258.
    • (1983) Comm. ACM , vol.26 , Issue.4 , pp. 254-258
    • Norman, D.A.1
  • 16
    • 1842639407 scopus 로고    scopus 로고
    • The Tyranny of Choice
    • Apr
    • B. Schwartz, "The Tyranny of Choice," Scientific Am., Apr. 2004, pp. 71-75.
    • (2004) Scientific Am , pp. 71-75
    • Schwartz, B.1
  • 19
    • 41949129914 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse, Chronology of Data Breaches, www.privacyrights.org/ar/ChronDataBreaches.htm.
    • Privacy Rights Clearinghouse, Chronology of Data Breaches, www.privacyrights.org/ar/ChronDataBreaches.htm.
  • 20
    • 41949103452 scopus 로고    scopus 로고
    • What Happened in Vegas
    • 31 May 2007;
    • R. Stern, "What Happened in Vegas...," Phoenix New Times, 31 May 2007; www.phoenixnewtimes.com/2007-05-31/news/what-happened- in-vegas/full.
    • Phoenix New Times
    • Stern, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.