skip to main content
article
Free Access

Users are not the enemy

Published:01 December 1999Publication History
First page image

References

  1. 1 DeAlvare, A.M. A framework for password selection. In Proceedings of Unix Security Workshop II. (Portland, Aug. 29-30, 1998).Google ScholarGoogle Scholar
  2. 2 DeAlvare, A.M. How crackers crack passwords or what passwords to avoid. In Proceedings of Unix Security Workshop II. (Portland, 1990).Google ScholarGoogle Scholar
  3. 3 Davis, C. and Ganesan, R. BApasswd: A new proactive password checker. In Proceedings of the National Computer Security Conference '93, the 16th NIST/NSA conference. 1993, 1-15.Google ScholarGoogle Scholar
  4. 4 Davis, D. and Price, W. Security for Computer Networks. Wiley, Chich-ester, 1987.Google ScholarGoogle Scholar
  5. 5 FIPS. Password Usage. Federal Information Processing Standards Pub-lication. May 30, 1985.Google ScholarGoogle Scholar
  6. 6 Ford, W. Computer Communications Security: Principles, Standard Pro-tocols and Techniques. Prentice Hall, NJ, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Gordon, S. Social Engineering: Techniques and Prevention. Computer Security, 1995Google ScholarGoogle Scholar
  8. 8 Hitchings, J. Deficiencies of the traditional approach to information security and the requirements for a new methodology. Computers and Security, 14, 1995, 377-383.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 Parker, D.B. Restating the foundation of information security. In G.C. Gable and W.J. Caelli, Eds., IT Security: The Need for International Co-operation. Elsevier Science Publishers, Holland, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Strauss, A. and Corbin, J. Basics of Qualitative Research: Grounded The-ory Procedures and Techniques. Sage, Newbury Park, 1990.Google ScholarGoogle Scholar
  11. 11 Wickens, C.D. Engineering Psychology and Human Performance, 2d ed. Harper Collins, NY, 1992.Google ScholarGoogle Scholar

Index Terms

  1. Users are not the enemy

                Recommendations

                Reviews

                Jaak Tepandi

                Computer security is vital to many organizations that depend on their information resources. Complex and expensive security mechanisms are useless if users compromise security measures such as password protection. This useful short article investigates why this happens and how to take remedial measures. The authors argue that the narrow technical design perspective produces security mechanisms that are less effective than they are generally assumed to be. They insist on user-centered security design. A number of real-life examples illustrate situations where users have trouble working with multiple passwords or understanding the need for security. The article gives recommendations on password content, multiple passwords, users' perception of security, and work practices. It is useful reading for security managers, system administrators, and other professionals seeking ways to improve the effectiveness of security measures.

                Access critical reviews of Computing literature here

                Become a reviewer for Computing Reviews.

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image Communications of the ACM
                  Communications of the ACM  Volume 42, Issue 12
                  Dec. 1999
                  82 pages
                  ISSN:0001-0782
                  EISSN:1557-7317
                  DOI:10.1145/322796
                  Issue’s Table of Contents

                  Copyright © 1999 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 December 1999

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format