Security in the wild: user strategies for managing security as an everyday, practical problem

被引:149
作者
Dourish, Paul [1 ]
Grinter, Rebecca E. [2 ]
de la Flor, Jessica Delgado [1 ]
Joseph, Melissa [1 ]
机构
[1] Univ Calif Irvine, Sch Informat & Comp Sci, Irvine, CA 92697 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
Access Control; Ubiquitous Computing; Security Management; Email Message; Security Technology;
D O I
10.1007/s00779-004-0308-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 [计算机科学与技术];
摘要
Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people's ability to understand them and use them as part of their work. As a step towards solving this problem, we have been examining how people experience security as a facet of their daily life, and how they routinely answer the question, "is this system secure enough for what I want to do?" We present a number of findings concerning the scope of security, attitudes towards security, and the social and organizational contexts within which security concerns arise, and point towards emerging technical solutions.
引用
收藏
页码:391 / 401
页数:11
相关论文
共 34 条
[1]
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility [J].
Ackerman, MS .
HUMAN-COMPUTER INTERACTION, 2000, 15 (2-3) :179-203
[2]
Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[3]
Altman I., 1975, The Environment and Social Behavior
[4]
[Anonymous], 2002, PROCEEDING NETWORK D
[5]
[Anonymous], PEOPLE COMPUTERS
[6]
Barney G., 1967, Awareness of Dying, DOI DOI 10.4324/9780203793206
[7]
Bernard H. R., 1988, RES METHODS CULTURAL
[8]
Blaze M., 1993, ACM Conference on Computer and Communications Security, P9, DOI 10.1145/168588.168590
[9]
Brostoff S, 2000, BCS CONFERENCE S, P405
[10]
Dhamija R, 2000, P 9 USENIX SEC S DEN