Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security

被引:274
|
作者
Sasse, MA [1 ]
Brostoff, S [1 ]
Weirich, D [1 ]
机构
[1] UCL, Dept Comp Sci, London WC1E 6BT, England
关键词
D O I
10.1023/A:1011902718709
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security research community has recently recognised that user behaviour plays a part in many security failures, and it has become common to refer to users as the 'weakest link in the security chain'. We argue that simply blaming users will not lead to more effective security systems. Security designers must identify the causes of undesirable user behaviour, and address these to design effective security systems. We present examples of how undesirable user behaviour with passwords can be caused by failure to recognise the characteristics of human memory, unattainable or conflicting task demands, and lack of support, training and motivation. We conclude that existing human/computer interaction knowledge and techniques can be used to prevent or address these problems, and outline a vision of a holistic design approach for usable and effective security.
引用
收藏
页码:122 / 131
页数:10
相关论文
共 50 条
  • [1] From Weakest Link to Security Hero: Transforming Staff Security Behavior
    Pfleeger, Shari Lawrence
    Sasse, M. Angela
    Furnham, Adrian
    [J]. JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2014, 11 (04) : 489 - 510
  • [2] Human Factor: The Weakest Link of Security?
    Jasek, Roman
    Sarga, Libor
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 317 - 326
  • [3] The Weakest Link Human Behaviour and the Corruption of Information Security Management in Organisations - an Analytical Framework
    Holmberg, Robert
    Sundstrom, Mikael
    [J]. IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2008, : 94 - +
  • [4] Human computer interaction: An information security perspectives
    Eloff, MM
    Eloff, JHP
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 535 - 545
  • [5] Accessible privacy and security: a universally usable human-interaction proof tool
    Sauer, Graig
    Holman, Jonathan
    Lazar, Jonathan
    Hochheiser, Harry
    Feng, Jinjuan
    [J]. UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2010, 9 (03) : 239 - 248
  • [6] Accessible privacy and security: a universally usable human-interaction proof tool
    Graig Sauer
    Jonathan Holman
    Jonathan Lazar
    Harry Hochheiser
    Jinjuan Feng
    [J]. Universal Access in the Information Society, 2010, 9 : 239 - 248
  • [7] Ubiquitous human-computer interaction: Making services usable and controllabe for all
    Herczeg, Michael
    Koch, Michael
    [J]. Informatik-Spektrum, 2015, 38 (04) : 290 - 295
  • [8] A human–computer interaction approach for healthcare
    Pere Ponsa
    Daniel Guasch
    [J]. Universal Access in the Information Society, 2018, 17 : 1 - 3
  • [9] A human-computer interaction approach for healthcare
    Ponsa, Pere
    Guasch, Daniel
    [J]. UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2018, 17 (01) : 1 - 3
  • [10] A New Approach to Architecture of Human computer Interaction
    Ghanbari, Amir Mohammad
    Ghanbari, Shamsollah
    Norouzi, Yaghoub
    [J]. 2017 IEEE 4TH INTERNATIONAL CONFERENCE ON SMART INSTRUMENTATION, MEASUREMENT AND APPLICATION (ICSIMA 2017), 2017,