Circumvention of Security: Good Users Do Bad Things
Title | Circumvention of Security: Good Users Do Bad Things |
Publication Type | Journal |
Year of Publication | 2013 |
Authors | Jim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College |
ISBN Number | 1540-7993 |
Keywords | Access controls, authentication, computer security, human factors, NSA SoS Lablets Materials, Science of Human Circumvention of Security, science of security, UIUC |
Abstract | Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn't, and good people circumvent. |
Notes | Published in IEEE Security & Privacy, volume 11, issue 5, September - October 2013. |
URL | http://ieeexplore.ieee.org/document/6630017/?reload=true&arnumber=6630017 |
DOI | 10.1109/MSP.2013.110 |
Citation Key | node-31208 |
Attachment | Size |
---|---|
bytes |