Usability and Security An Appraisal of Usability Issues in Information Security Methods

In the modern multi-user computer environment, Internet-capable network servers provide connectivity that allows a large portion of the user population to access information at the desktop from sources around the world. Because of the ease with which information can be accessed, computer security breaches may occur unless systems and restricted information stored therein are kept secure. Breaches of security can have serious consequences, including theft of confidential corporate documents, compromise of intellectual property, unauthorized modification of systems and data, denial of service, and others. Considerable research has been conducted on threats to security.

[1]  E. E. Schultz,et al.  A framework for password selection. [Password recommendations] , 1988 .

[2]  Said S. Al-Gahtani,et al.  Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology , 1999, Behav. Inf. Technol..

[3]  Donn B. Parker,et al.  Restating the Foundation of Information Security , 1991, SEC.

[4]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[5]  Vijay T. Ahuja Network and Internet security , 1996 .

[6]  T. Landauer,et al.  Handbook of Human-Computer Interaction , 1997 .

[7]  M. Lynne Markus,et al.  Power, politics, and MIS implementation , 1987, CACM.

[8]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[9]  Macarena Aspillaga Perceptual foundations in the design of visual displays , 1996 .

[10]  Dennis E. Egan,et al.  Handbook of Human Computer Interaction , 1988 .

[11]  Robert W. Zmud,et al.  An attributional explanation of individual resistance to the introduction of information technologies in the workplace , 1996, Behav. Inf. Technol..

[12]  Carol A. Siegel,et al.  Internet Security for Business , 1996 .

[13]  Michael Wagner,et al.  User verification through pointing characteristics: an exploration examination , 1996, Int. J. Hum. Comput. Stud..

[14]  William N. Dember,et al.  VIGILANCE AND WORKLOAD IN AUTOMATED SYSTEMS. , 1996 .

[15]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[16]  Gavriel Salvendy,et al.  A Task Analysis of Usability in Third-Party Authentication , 2000 .

[17]  Agnes Werner,et al.  An attributional explanation of individual resistance to the introduction of information technologies in the workplace , 1996, Behav. Inf. Technol..

[18]  Robin L. Sherman Biometrics futures , 1992, Comput. Secur..

[19]  Steven M. Bellovin,et al.  Network and Internet Security , 1997, Inf. Secur. J. A Glob. Perspect..

[20]  Doug Mahar,et al.  Theoretical Examination of the Effects of Anxiety and Electronic Performance Monitoring on Behavioural Biometric Security Systems , 1995, Interact. Comput..

[21]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[22]  Janet J. Turnage,et al.  The challenge of new workplace technology for psychology. , 1990 .

[23]  John D. Lee,et al.  Book review of Handbook of Human Factors and Ergonomics (2nd ed.) , 1999 .