DocumentCode :
47968
Title :
Circumvention of Security: Good Users Do Bad Things
Author :
Blythe, Jim ; Koppel, Ross ; Smith, Sean W.
Volume :
11
Issue :
5
fYear :
2013
fDate :
Sept.-Oct. 2013
Firstpage :
80
Lastpage :
83
Abstract :
Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn´t, and good people circumvent.
Keywords :
security of data; security circumvention; Access controls; Authentication; Computer security; Human factors; HCISEC; circumvention; usability;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2013.110
Filename :
6630017
Link To Document :
بازگشت