Transforming the 'Weakest Link' — a Human/Computer Interaction Approach to Usable and Effective Security

  • Authors:
  • M. A. Sasse;S. Brostoff;D. Weirich

  • Affiliations:
  • -;-;-

  • Venue:
  • BT Technology Journal
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security research community has recently recognised that user behaviour plays a part in many security failures, and it has become common to refer to users as the 'weakest link in the security chain'. We argue that simply blaming users will not lead to more effective security systems. Security designers must identify the causes of undesirable user behaviour, and address these to design effective security systems. We present examples of how undesirable user behaviour with passwords can be caused by failure to recognise the characteristics of human memory, unattainable or conflicting task demands, and lack of support, training and motivation. We conclude that existing human/computer interaction knowledge and techniques can be used to prevent or address these problems, and outline a vision of a holistic design approach for usable and effective security.