skip to main content
research-article
Free Access

The psychology of security

Published:01 April 2008Publication History
Skip Abstract Section

Abstract

Why do good users make bad decisions?

References

  1. Adams, A. and Sasse, A.S. Users are not the enemy. Commun. ACM 42, (1999) 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Borgida, E., and Nisbett, R.E. The differential impact of abstract vs. concrete information on decisions. J. Applied Social Psychology 7 (1977) 258--271.Google ScholarGoogle ScholarCross RefCross Ref
  3. Dhamija, R., Tygar, J.D., and Hearst, M. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montreal, Quebec, Canada, Apr. 22--27, 2006). R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries, and G. Olson, Eds. ACM, New York, 581--590. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Downs, J.S., Holbrook, M., and Cranor, L.F. Behavioral response to phishing risk. In Proceedings of the Anti-Phishing Working Groups 2nd Annual Ecrime Researchers Summit (Pittsburgh, PA, Oct. 4--5, 2007). ACM, New York, 37--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Greenwald, S.J., Olthoff, K.G., Raskin, V., and Ruch, W. The user non-acceptance paradigm: INFOSEC's dirty little secret. New Security Paradigms Workshop, 35--43. ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Slovic, P., Fischhoff, B., and Lichtenstein, S. Facts versus fears: Understanding perceived risks. Judgment under Uncertainty: Heuristics and Biases. D. Kahneman, P. Slovic, and A. Tversky, eds. Cambridge University Press, New York, 1986, 463-489.Google ScholarGoogle Scholar
  7. Smetters, D.K. and Grinter, R.E. Moving from the design of usable security technologies to the design of useful secure applications. New Security Paradigms Workshop. ACM, New York, 2002, 82--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Tversky, A. and Kahneman, D. Rational choice and the framing of decisions. J. Business 59 (1986), 251--278.Google ScholarGoogle ScholarCross RefCross Ref
  9. Whitten, A. and Tygar J.D. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium (1999). USENIX Association, Berkeley, CA, 169--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Wright, P. The harassed decision maker: Timer pressure, distractions, and the use of evidence. J. Applied Psychology 59, (1974), 555--561.Google ScholarGoogle ScholarCross RefCross Ref
  11. Yee, K.P. User interaction design for secure systems. Proceedings of the 4th International Conference on Information and Communications Security. Springer-Verlag, London, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zurko, M.E. and Simon, R.T. User-centered security. New Security Paradigms Workshop. ACM, New York, 27--33. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The psychology of security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 51, Issue 4
          The psychology of security: why do good users make bad decisions?
          April 2008
          94 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/1330311
          Issue’s Table of Contents

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 April 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format