Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: CS-TR-794
Languages: English
Types: Book
Subjects: Q
Computer security has traditionally been assessed from a technical point of view. In this paper, we wish to adopt a cognitive standpoint and investigate some of the cognitive processes involved in computer security. One angle which is not considered very often is the active role played by legal users of systems in impairing the level of protection. In this paper, we thus attempt to highlight the cognitive processes underlying security impairments by legal users. This approach relies on the concept of trade-off. At the end of the paper, we propose a short usability-centered set of recommendations.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Adams, A. & Sasse, M. A. Users are not the enemy. Communications of the ACM, 42, pp. 41-46 (1999).
    • Technical Report CS-TR-790, School of Computing Science, University of Newcastle upon Tyne, UK (2003).
    • Besnard, D. & Greathead, D. A cognitive approach to safe violations. Technical Report CS-TR-791, University of Newcastle, UK.
    • Brostoff, S. & Sasse, M. A. Safe and sound: a safety-critical approach to security. Proceedings of the New Security Paradigms Workshop, Cloudcroft, NM, pp. 41-50 (2001) Flechais, I. & Sasse, M. A. Developing secure and usable software. To be presented at OT2003 (March 30th-April 2nd 2003).
    • Fujita, Y. Actualities need to be captured. Cognition, Technology & Work, 2, pp. 212-214 (2000).
    • Furuta, K., Sasou, K., Kubota, R,. Ujita, H., Shuto, Y. & Yagi, E. Human factor analysis of JCO criticality accident. Cognition, Technology & Work, 2, pp. 182-203 (2000).
    • Gasser, L. The integration of computing and routine work. ACM Transactions on Office Information systems, 4, pp. 205-225 (1986) Mancini, G. Commentary: Models of the decision maker in unforeseen accidents. International Journal of Man-Machine Studies, 27, pp. 631-639 (1987).
    • Reason, J. Human error. Cambridge University Press (1990).
    • Sasse, M. A., Brostoff, S. & Weirich, D. Transforming the weakest link - a human computer interaction approach to usable effective security. BT Technological Journal, 19, pp. 122-131 (2001).
    • Simon, H. A.. Models of man. New York, Wiley (1957).
    • Weirich, D. & Sasse, M. A. Pretty good persuasion: A first step towards effective password security in the real world. Proceedings of the New Security Paradigms Workshop, Cloudcroft, NM, pp. 137-144 (2002).
    • Zurko, M. E. & Simon, R. T. User-centred security. Proceedings of the workshop on New Security Paradigms, Lake Arrowhead, CA, pp. 27-33 (1996).
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article