Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security

被引:294
作者
Sasse, MA [1 ]
Brostoff, S [1 ]
Weirich, D [1 ]
机构
[1] UCL, Dept Comp Sci, London WC1E 6BT, England
关键词
D O I
10.1023/A:1011902718709
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security research community has recently recognised that user behaviour plays a part in many security failures, and it has become common to refer to users as the 'weakest link in the security chain'. We argue that simply blaming users will not lead to more effective security systems. Security designers must identify the causes of undesirable user behaviour, and address these to design effective security systems. We present examples of how undesirable user behaviour with passwords can be caused by failure to recognise the characteristics of human memory, unattainable or conflicting task demands, and lack of support, training and motivation. We conclude that existing human/computer interaction knowledge and techniques can be used to prevent or address these problems, and outline a vision of a holistic design approach for usable and effective security.
引用
收藏
页码:122 / 131
页数:10
相关论文
共 7 条
[2]   Biometrics - real identities for a virtual world [J].
Rejman-Greene, M .
BT TECHNOLOGY JOURNAL, 2001, 19 (03) :115-121
[3]   PROTECTION MOTIVATION THEORY OF FEAR APPEALS AND ATTITUDE-CHANGE [J].
ROGERS, RW .
JOURNAL OF PSYCHOLOGY, 1975, 91 (01) :93-114
[4]   PASS-SENTENCE - A NEW APPROACH TO COMPUTER CODE [J].
SPECTOR, Y ;
GINZBERG, J .
COMPUTERS & SECURITY, 1994, 13 (02) :145-160
[5]   A COMPARISON OF PASSWORD TECHNIQUES FOR MULTILEVEL AUTHENTICATION MECHANISMS [J].
ZVIRAN, M ;
HAGA, WJ .
COMPUTER JOURNAL, 1993, 36 (03) :227-237
[6]  
Zviran M., 1990, Computers & Security, V9, DOI 10.1016/0167-4048(90)90115-A
[7]  
[No title captured]