Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Circumvention of Security: Good Users Do Bad Things

Published: 01 September 2013 Publication History

Abstract

Conventional wisdom is that the textbook view describes reality, and only bad people (not good people trying to get their jobs done) break the rules. And yet it doesn't, and good people circumvent.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 11, Issue 5
September 2013
92 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 September 2013

Author Tags

  1. HCISEC
  2. circumvention
  3. usability

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Lacking the tools and support to fix frictionProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632194(131-150)Online publication date: 7-Aug-2023
  • (2022)The boundedly rational employeeJournal of Computer Security10.3233/JCS-21004630:3(435-464)Online publication date: 1-Jan-2022
  • (2022)Circumventing CircumventionManagement Science10.1287/mnsc.2021.402768:4(2914-2931)Online publication date: 1-Apr-2022
  • (2022)A Quantitative Field Study of a Persuasive Security Technology in the WildSocial Informatics10.1007/978-3-031-19097-1_13(211-232)Online publication date: 19-Oct-2022
  • (2021)“I Might be Using His… But It is Also Mine!”: Ownership and Control in Accounts Designed for SharingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445301(1-13)Online publication date: 6-May-2021
  • (2020)Industry responses to the european directive on security of network and information systems (NIS)Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security10.5555/3488905.3488922(301-317)Online publication date: 10-Aug-2020
  • (2020)Understanding Cybersecurity Practices in Emergency DepartmentsProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376881(1-8)Online publication date: 21-Apr-2020
  • (2019)Normal and EasyProceedings of the ACM on Human-Computer Interaction10.1145/33591853:CSCW(1-25)Online publication date: 7-Nov-2019
  • (2019)Heuristics and Models for Evaluating the Usability of Security MeasuresProceedings of Mensch und Computer 201910.1145/3340764.3340789(275-285)Online publication date: 8-Sep-2019
  • (2019)You’ve Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in OrganizationsSocio-Technical Aspects in Security and Trust10.1007/978-3-030-55958-8_4(66-86)Online publication date: 26-Sep-2019
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media