Visible to the public Circumvention of Security: Good Users Do Bad ThingsConflict Detection Enabled

TitleCircumvention of Security: Good Users Do Bad Things
Publication TypeJournal
Year of Publication2013
AuthorsJim Blythe, University of Southern California, Ross Koppel, University of Pennsylvania, Sean Smith, Dartmouth College
ISBN Number1540-7993
KeywordsAccess controls, authentication, computer security, human factors, NSA SoS Lablets Materials, Science of Human Circumvention of Security, science of security, UIUC
Abstract

Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn't, and good people circumvent.

Notes

Published in IEEE Security & Privacy, volume 11, issue 5, September - October 2013.

URLhttp://ieeexplore.ieee.org/document/6630017/?reload=true&arnumber=6630017
DOI10.1109/MSP.2013.110
Citation Keynode-31208

Other available formats:

Circumvention of Security: Good Users Do Bad Things
AttachmentSize
bytes