Designing Systems That People Will Trust

  1. (PDF, 425 KB)
AuthorSearch for: ; Search for: ; Search for:
ConferenceJanuary 25, 2005.
AbstractAs we have seen in a previous chapter [1], any security system is only as secure as its weakest link. Invariably, because of their social nature (and because of their human nature), the weakest links are often humans [2]. Thus, passwords get written on post-it notes and stuck to computer screens, or they become cycles of familiar words and numbers. In addition, social engineering succeeds in gaining inappropriate entry into supposedly secure systems because people will say things they're not supposed to, often to complete strangers who they just ‘like.' Also, security systems are often turned off because they're too difficult to use, obscure, or downright impossible to comprehend for mere mortals [3].
Publication date
AffiliationNRC Institute for Information Technology; National Research Council Canada
Peer reviewedNo
NRC number47438
NPARC number8913238
Export citationExport as RIS
Report a correctionReport a correction
Record identifier71643b1c-8d25-4340-8a45-75e0a44fcd18
Record created2009-04-22
Record modified2016-05-09
Bookmark and share
  • Share this page with Facebook (Opens in a new window)
  • Share this page with Twitter (Opens in a new window)
  • Share this page with Google+ (Opens in a new window)
  • Share this page with Delicious (Opens in a new window)
Date modified: