메뉴 건너뛰기




Volumn , Issue , 2007, Pages 33-42

Security automation considered harmful?

Author keywords

Automation; Design guidelines; Security policy; Usable security

Indexed keywords

AUTOMATED APPROACH; AUTOMATION DESIGN; DESIGN GUIDELINES; END USERS; INFORMATION SECURITY; INHERENT LIMITATIONS; REMOTE SERVICES; RESEARCH DIRECTIONS; SECURITY POLICY; SECURITY SOLUTIONS; SOCIAL FACTOR; USABLE SECURITY;

EID: 70450242707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1600176.1600182     Document Type: Conference Paper
Times cited : (57)

References (53)
  • 1
    • 0034459145 scopus 로고    scopus 로고
    • The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility
    • Ackerman, M. 2000. The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction Journal, vol. 15, pp. 179-203.
    • (2000) Human-Computer Interaction Journal , vol.15 , pp. 179-203
    • Ackerman, M.1
  • 3
    • 0001163097 scopus 로고
    • Ironies of automation
    • ed. J. Rasmussen, K. Duncan, & J. Leplat, New York: Wiley
    • Bainbridge, L. 1987 Ironies of automation. In New Technology and Human Error (ed. J. Rasmussen, K. Duncan, & J. Leplat). New York: Wiley.
    • (1987) New Technology and Human Error
    • Bainbridge, L.1
  • 4
    • 0035569004 scopus 로고    scopus 로고
    • Intelligibility and Accountability: Human Considerations in Context Aware Systems
    • ed, Lawrence Erlbaum Associates, NJ. pp
    • Bellotti, V., and Edwards, W.K., "Intelligibility and Accountability: Human Considerations in Context Aware Systems," Journal of Human-Computer Interaction, 16:2-4, 2001. Thomas Moran, ed., Lawrence Erlbaum Associates, NJ. pp. 193-212.
    • (2001) Journal of Human-Computer Interaction , vol.16
    • Bellotti, V.1    Edwards, W.K.2
  • 5
    • 70450229325 scopus 로고    scopus 로고
    • Yale University Press
    • Benkler, Y. Wealth of Nations. Yale University Press, 2006, pp. 133-175.
    • (2006) Wealth of Nations , pp. 133-175
    • Benkler, Y.1
  • 6
    • 70450250873 scopus 로고    scopus 로고
    • How to Save the Internet
    • March 15
    • Berinato, S. How to Save the Internet, March 15, 2005, CIO Magazine.
    • (2005) CIO Magazine
    • Berinato, S.1
  • 11
    • 70450244097 scopus 로고    scopus 로고
    • Consul: http://www.consul.com/Content.asp?id=58
    • Consul
  • 12
    • 0030107190 scopus 로고    scopus 로고
    • A Taxonomy for Key Escrow Encryption Systems
    • March
    • Denning, D.E., and Branstad, D.K. "A Taxonomy for Key Escrow Encryption Systems," Communications of the ACM, 39:3, March 1996.
    • (1996) Communications of the ACM , vol.39 , pp. 3
    • Denning, D.E.1    Branstad, D.K.2
  • 15
    • 0032284173 scopus 로고    scopus 로고
    • Technomethodology: Foundational Relationships between Ethno-methodology and System Design
    • Dourish, P. and Button, G. On "Technomethodology": Foundational Relationships between Ethno-methodology and System Design. Human-Computer Interaction, 13(4), 1998, pp. 395-432
    • (1998) Human-Computer Interaction , vol.13 , Issue.4 , pp. 395-432
    • Dourish, P.1    Button, G.O.2
  • 16
    • 84900482702 scopus 로고    scopus 로고
    • Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem
    • Springer Verlag
    • Dourish, P. Grinter, R.E., Delgado de la Flor, J., and Joseph, M. "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem." Personal and Ubiquitous Computing 8, pp. 391-401. Springer Verlag, 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    Delgado de la Flor, J.3    Joseph, M.4
  • 19
    • 70450286027 scopus 로고    scopus 로고
    • Internet about to collapse says Finnish scientist
    • Oct. 18, Also
    • Fisher, K. "Internet about to collapse says Finnish scientist". ars technica, Oct. 18, 2004. Also: www.arstechnica.com/news.ars/post/ 20041018-4318.html
    • (2004) ars technica
    • Fisher, K.1
  • 26
    • 70450264162 scopus 로고    scopus 로고
    • IBM: http://www.iss.net/products/Proventia-Management-SiteProtector/ product-main-page.html
  • 28
    • 33745116854 scopus 로고
    • Access Control Model for Groupware Applications
    • Huddersfield University, UK. August
    • Kanawati, R., and Riveill, M. "Access Control Model for Groupware Applications." In Proceedings of Human-Computer Interaction. Huddersfield University, UK. August, 1995. pp. 66-71.
    • (1995) Proceedings of Human-Computer Interaction , pp. 66-71
    • Kanawati, R.1    Riveill, M.2
  • 29
    • 70450252845 scopus 로고    scopus 로고
    • Marimba: www.bmc.com/products/attachments/ MarimbaClientManagementSecurity.pdf
    • Marimba
  • 32
    • 70450247803 scopus 로고    scopus 로고
    • is not the Answer to Security Problems, 2004
    • Nielsen, Jakob. User Education is not the Answer to Security Problems. http://www.useit.com/alertbox/20041025.html (2004).
    • User Education
    • Nielsen, J.1
  • 34
    • 0025705911 scopus 로고
    • The "problem" of automation: Inappropriate feedback and interaction, not "over-automation
    • D. E. Broadbent, A. Baddeley & J. T. Reason Eds, Oxford: Oxford University Press
    • Norman, D. A. (1990). The "problem" of automation: Inappropriate feedback and interaction, not "over-automation". In D. E. Broadbent, A. Baddeley & J. T. Reason (Eds.), Human factors in hazardous situations (pp. 585-593). Oxford: Oxford University Press.
    • (1990) Human factors in hazardous situations , pp. 585-593
    • Norman, D.A.1
  • 35
    • 0038037379 scopus 로고    scopus 로고
    • Palen and Dourish Unpacking Privacy for a Networked World, Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Ft. Lauderdale, FL, 2003.
    • Palen and Dourish "Unpacking Privacy for a Networked World", Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Ft. Lauderdale, FL, 2003.
  • 38
    • 70450235930 scopus 로고    scopus 로고
    • Sasse, M. A., Has Johnny Learnt to Encrypt by Now? Examining the Troubled Relationship Between a Security Solution and Its Users. 5th Annual PKI R&D Workshop (2006). middleware. Internet2.edu/pki06/proceedings/ sassejohnny-usability.ppt
    • Sasse, M. A., Has Johnny Learnt to Encrypt by Now? Examining the Troubled Relationship Between a Security Solution and Its Users. 5th Annual PKI R&D Workshop (2006). middleware. Internet2.edu/pki06/proceedings/ sassejohnny-usability.ppt
  • 39
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
    • July
    • Sasse, M. A., Brostoff, S., Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technol J Vol. 19 No. 3, July 2001.
    • (2001) BT Technol J , vol.19 , Issue.3
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 46
    • 0033236359 scopus 로고    scopus 로고
    • The Ethnography of Infrastructure
    • Star, S.L., The Ethnography of Infrastructure. American Behavioral Scientist 43:3, pp. 377-391, 1999.
    • (1999) American Behavioral Scientist , vol.43 , Issue.3 , pp. 377-391
    • Star, S.L.1
  • 52
    • 34547355863 scopus 로고    scopus 로고
    • Guidelines and Strategies for Secure Interaction Design
    • L. Cranor & S. Garfinkel Eds, O'Reilly & Associates
    • Yee, K. Guidelines and Strategies for Secure Interaction Design. In L. Cranor & S. Garfinkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use, O'Reilly & Associates, 2005.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use
    • Yee, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.