DocumentCode
47968
Title
Circumvention of Security: Good Users Do Bad Things
Author
Blythe, Jim ; Koppel, Ross ; Smith, Sean W.
Volume
11
Issue
5
fYear
2013
fDate
Sept.-Oct. 2013
Firstpage
80
Lastpage
83
Abstract
Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn´t, and good people circumvent.
Keywords
security of data; security circumvention; Access controls; Authentication; Computer security; Human factors; HCISEC; circumvention; usability;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2013.110
Filename
6630017
Link To Document