LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Besnard, Denis; Arief, Budi (2003)
Publisher: CS-TR-794
Languages: English
Types: Book
Subjects: Q
Computer security has traditionally been assessed from a technical point of view. In this paper, we wish to adopt a cognitive standpoint and investigate some of the cognitive processes involved in computer security. One angle which is not considered very often is the active role played by legal users of systems in impairing the level of protection. In this paper, we thus attempt to highlight the cognitive processes underlying security impairments by legal users. This approach relies on the concept of trade-off. At the end of the paper, we propose a short usability-centered set of recommendations.

Share - Bookmark

Download from

Cite this article