• DocumentCode
    47968
  • Title

    Circumvention of Security: Good Users Do Bad Things

  • Author

    Blythe, Jim ; Koppel, Ross ; Smith, Sean W.

  • Volume
    11
  • Issue
    5
  • fYear
    2013
  • fDate
    Sept.-Oct. 2013
  • Firstpage
    80
  • Lastpage
    83
  • Abstract
    Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn´t, and good people circumvent.
  • Keywords
    security of data; security circumvention; Access controls; Authentication; Computer security; Human factors; HCISEC; circumvention; usability;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2013.110
  • Filename
    6630017