The Security Cost of Cheap User Interaction

被引:0
|
作者
Boehme, Rainer [1 ]
Grossklags, Jens [2 ]
机构
[1] Univ Munster, Leonardo Campus 3, D-48149 Munster, Germany
[2] Penn State Univ, University Pk, PA 16802 USA
关键词
Interdisciplinary Security and Privacy; Attention Economics; Usable Security; Bounded Rationality; Security Warnings; Notice and Consent; HCI; Security Economics; Policy; PRIVACY; CONTRACTS; ONLINE; ECONOMICS; CHOICE; SAFETY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Human attention is a scarce resource, and lack thereof can cause severe security breaches. As most security techniques rely on considerate human intervention in one way or another, this resource should be consumed economically. In this context, we postulate the view that every false alarm or unnecessary user interaction imposes a negative externality on all other potential consumers of this chunk of attention. The paper identifies incentive problems that stimulate over-consumption of human attention in security applications. It further outlines a lump-of-attention model, devised against the backdrop of established theories in the behavioral sciences, and discusses incentive mechanisms to fix the mis-allocation problem in security notification, for instance the idea of a Pigovian tax on attention consumption.
引用
收藏
页码:67 / 82
页数:16
相关论文
共 50 条
  • [1] Counting the security cost of cheap calls
    VoipSec, United Kingdom
    Netw. Secur., 11 (9-11):
  • [2] Cheap hardware parallelism implies cheap security
    Acticmez, Onur
    Seifert, Jean-Pierre
    WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2007, : 80 - +
  • [3] Cheap Password Security
    Curley, B.
    Digital Systems Journal, 172 (2-3):
  • [4] THE COST OF CHEAP LABOR
    STEPHENSON, J
    NEW SOCIETY, 1988, 83 (1307): : 26 - 27
  • [5] THE COST OF CHEAP DRUGS
    Bate, Roger
    ECONOMIC AFFAIRS, 2007, 27 (02) : 101 - 101
  • [6] The cost of cheap labor
    Flaum, H
    AVIATION WEEK & SPACE TECHNOLOGY, 2003, 159 (14): : 10 - 10
  • [7] COST OF CHEAP FOOD
    不详
    DAIRY INDUSTRIES INTERNATIONAL, 1976, 41 (11) : 397 - 397
  • [8] For want of a bit the user was lost: Cheap user modeling
    Orwant, J
    IBM SYSTEMS JOURNAL, 1996, 35 (3-4) : 398 - 416
  • [9] Security isn't cheap
    Hebert, Adam J.
    Air Force Magazine, 2010, 93 (11):
  • [10] Security enhancement for a low computation cost user authentication scheme
    Sattarzadeh, Behnam
    Asadpour, Mahdi
    Jalili, Rasool
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 5 - +