Security and usability : designing secure systems that people can use /

Computer users have been taught for years that computer security systems can't be effective unless they are complex and difficult to use. In reality, this conventional wisdom is completely wrong. Tomorrow's computers won't be secure unless researchers, designers, and programmers can i...

Full description

Bibliographic Details
Other Authors: Cranor, Lorrie Faith, Garfinkel, Simson
Format: Book
Language:English
Published: Beijing : Farnham : O'Reilly, c2005
Beijing ; Sebastapol, CA : c2005
Beijing ; Farnham : [2005]
Subjects:
LEADER 18362nam a2200889 a 4500
001 ff5ce685-8068-432d-b156-2e523b8c2a1d
005 20240908000000.0
008 050914t20052005cc ac b 001 0 eng
010 |a  2006271007 
015 |a GBA578560  |2 bnb 
016 7 |a 013293085  |2 Uk 
020 |a 0596008279 (pbk.) 
020 |a 0596008279  |q paperback 
035 |a (MCM)001355873MIT01 
035 |a (OCoLC)61701862 
035 |a (OCoLC)ocm61701862 
035 |a (PU)3910618-penndb-Voyager 
035 |a 3910618 
035 |a 5697704 
040 |a UKM  |b eng  |c UKM  |d BAKER  |d DST  |d IXA  |d DLC  |d UtOrBLW  |d OrLoB-B 
040 |a UKM  |b eng  |c UKM  |d BAKER  |d DST  |d IXA  |d MYG  |d OrLoB-B 
040 |a UKM  |b eng  |c UKM  |d BAKER  |d DST  |d IXA 
040 |a UKM  |b eng  |c UKM  |d BAKER  |d DST 
042 |a ukblsr  |a lccopycat 
042 |a ukblsr 
049 |a MYGG 
049 |a PAUU 
050 4 |a QA76.9.A25  |b S3533 2005 
050 4 |a QA76.9.A25.S3533 2005 
050 0 0 |a QA76.9.A25  |b S3758 2005 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Security and usability :  |b designing secure systems that people can use /  |c edited by Lorrie Faith Cranor & Simson Garfinkel 
260 |a Beijing :  |a Farnham :  |b O'Reilly,  |c c2005 
260 |a Beijing ;  |a Sebastapol, CA :  |b O'Reilly,  |c c2005 
264 1 |a Beijing ;  |a Farnham :  |b O'Reilly,  |c [2005] 
264 4 |c ©2005 
300 |a xviii, 714 p. :  |b ill. ;  |c 24 cm 
300 |a xviii, 714 p. :  |b ill., 2 ports. ;  |c 24 cm 
300 |a xviii, 714 pages :  |b illustrations, 2 portraits ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a PERSPECTIVE. Zonealarm: creating usable security products for consumers / Jordy Berson -- Firefox and the worry-free web / Blake Ross -- Users and trust: a microsoft case study / Chris Nodder -- IBM Lotus notes/Domino: embedding security in collaborative applications / Mary Ellen Zurko -- Achieving usable security in Groove Virtual Office / George Moromisato, et al. -- Part Six. THE CLASSICS. Users are not the enemy / Anne Adams and M. Angela Sasse -- Usability and privacy: a study of KaZaA P2P file sharing / Nathaniel S. Good and Aaron Krekelberg -- Why Johnny can't encrypt / Alma Whitten and J.D. Tygar 
505 0 |a Part One. Realigning usability and security. Psychological acceptability revisited / Matt Bishop -- Usable security / M. Angela Sasse and Ivan Flechais -- Design for usability / Bruce Tognazzini -- Usability design and evaluation for privacy and security solutions / Clare-Marie Karat, Carolyn Brodie, and John Karat -- Designing systems that people will trust / Andrew S. Patrick, Pamela Briggs, and Stephen Marsh. Part Two. AUTHENTICATION MECHANISMS. Evaluating authentication mechanisms / Karen Renaud -- The memorability and security of passwords / Jeff Yan, et al. -- Designing authentication systems with challenge questions / Mike Just -- Graphical passwords / Fabian Monrose and Michael K. Reiter -- Usable biometrics / Lynne Coventry -- Identifying users from their typing patterns / Alen Peacock, et al. -- The usability of security devices / Ugo Piazzalunga, et al. -- Guidelines and strategies for secure interaction design / Ka-Ping Yee -- Fighting phishing at the user interface / Robert C. Miller and Min Wu -- Sanitization and usability / Simson Garfinkel -- Making the impossible easy: usable PKI / Dirk Balfanz, et al. -- Simple desktop security with Chameleon / A. Chris Long and Courtney Moskowitz -- Security administration tools and practices / Eser Kandogan and Eben M. Haber. Part Four. PRIVACY AND ANONYMITY SYSTEMS. Privacy issues and human-computer interaction / Mark S. Ackerman and Scott D. Mainwaring -- A user-centric privacy space framework / Benjamin Brunk -- Five pitfalls in the design for privacy / Scott Lederer, et al. -- Privacy policies and privacy preferences / Lorrie Faith Cranor -- Privacy analysis for the casual user with Bugnosis / David Martin -- Informed consent by design / Batya Friedman, et al. -- Social approaches to end-user privacy management / Jeremy Goecks and Elizabeth D. Mynatt -- Anonymity loves company: usability and the network effect / Roger Dingledine and Nick Mathewson. Part Five. COMMERCIALIZING USABILITY: THE VENDOR 
505 0 0 |g 1  |t Psychological acceptability revisited /  |r Matt Bishop --  |g 2.  |t Usable security /  |r M. Angela Sasse and Ivan Flechais --  |g 3.  |t Design for usability /  |r Bruce Tognazzini --  |g 4.  |t Usability design and evaluation for privacy and security solutions /  |r Clare-Marie Karat, Carolyn Brodie and John Karat --  |g 5.  |t Designing systems that people will trust /  |r Andrew S. Patrick, Pamela Briggs and Stephen Marsh --  |g 6.  |t Evaluating authentication mechanisms /  |r Karen Renaud --  |g 7.  |t The memorability and security of passwords /  |r Jeff Yan, Alan Blackwell, Ross Anderson and Alasdair Grant --  |g 8.  |t Designing authentication systems with challenge questions /  |r Mike Just --  |g 9.  |t Graphical passwords /  |r Fabian Monrose and Michael K. Reiter --  |g 10.  |t Usable biometrics /  |r Lynne Coventry --  |g 11.  |t Identifying users from their typing patterns /  |r Alen Peacock, Xian Ke and Matt Wilkerson --  |g 12.  |t The usability of security devices /  |r Ugo Piazzalunga, Paola Salvaneschi and Paolo Coffetti --  |g 13.  |t Guidelines and strategies for secure interaction design /  |r Ka-Ping Yee --  |g 14.  |t Fighting phishing at the user interface /  |r Robert C. Miller and Min Wu --  |g 15.  |t Sanitization and usability /  |r Simson Garfinkel --  |g 16.  |t Making the impossible easy : usable PKI /  |r Dirk Balfanz, Glenn Durfee and D. K. Smetters --  |g 17.  |t Simple desktop security with Chameleon /  |r A. Chris Long and Courtney Moskowitz --  |g 18.  |t Security administration tools and practices /  |r Eser Kandogan and Eben M. Haber --  |g 19.  |t Privacy issues and human-computer interaction /  |r Mark S. Ackerman and Scott D. Mainwaring --  |g 20.  |t A user-centric privacy space framework /  |r Benjamin Brunk --  |g 21.  |t Five pitfalls in the design for privacy /  |r Scott Lederer, Jason I. Hong, Anind K. Dey and James A. Landay --  |g 22.  |t Privacy policies and privacy preferences /  |r Lorrie Faith Cranor --  |g 23.  |t Privacy analysis for the casual user with Bugnosis /  |r David Martin --  |g 24.  |t Informed consent by design /  |r Batya Friedman, Peyina Lin and Jessica K. Miller --  |g 25.  |t Social approaches to end-user privacy management /  |r Jeremy Goecks and Elizabeth D. Mynatt --  |g 26.  |t Anonymity loves company : usability and the network effect /  |r Roger Dingledine and Nick Mathewson --  |g 27.  |t ZoneAlarm : creating usable security products for consumers /  |r Jordy Berson --  |g 28.  |t Firefox and the worry-free Web /  |r Blake Ross --  |g 29.  |t Users and trust : a Microsoft case study /  |r Chris Nodder --  |g 30.  |t IBM Lotus notes/domino : embedding security in collaborative applications /  |r Mary Ellen Zurko --  |g 31.  |t Achieving usable security in groove virtual office /  |r George Moromisato, Paul Boyd and Nimisha Asthagiri --  |g 32.  |t Users are not the enemy /  |r Anne Adams and M. Angela Sasse --  |g 33.  |t Usability and privacy : a study of KaZaA P2P file sharing /  |r Nathaniel S. Good and Aaron Krekelberg --  |g 34.  |t Why Johnny can't encrypt /  |r Alma Whitten and J. D. Tygar. 
505 0 0 |g 1  |t Psychological acceptability revisited /  |r Matt Bishop --  |g 2.  |t Usable security /  |r M. Angela Sasse and Ivan Flechais --  |g 3.  |t Design for usability /  |r Bruce Tognazzini --  |g 4.  |t Usability design and evaluation for privacy and security solutions /  |r Clare-Marie Karat, Carolyn Brodie and John Karat --  |g 5.  |t Designing systems that people will trust /  |r Andrew S. Patrick, Pamela Briggs and Stephen Marsh --  |g 6.  |t Evaluating authentication mechanisms /  |r Karen Renaud --  |g 7.  |t The memorability and security of passwords /  |r Jeff Yan, Alan Blackwell, Ross Anderson and Alasdair Grant --  |g 8.  |t Designing authentication systems with challenge questions /  |r Mike Just --  |g 9.  |t Graphical passwords /  |r Fabian Monrose and Michael K. Reiter --  |g 10.  |t Usable biometrics /  |r Lynne Coventry --  |g 11.  |t Identifying users from their typing patterns /  |r Alen Peacock, Xian Ke and Matt Wilkerson --  |g 12.  |t The usability of security devices /  |r Ugo Piazzalunga, Paola Salvaneschi and Paolo Coffetti --  |g 13.  |t Guidelines and strategies for secure interaction design /  |r Ka-Ping Yee --  |g 14.  |t Fighting phishing at the user interface /  |r Robert C. Miller and Min Wu --  |g 15.  |t Sanitization and usability /  |r Simson Garfinkel --  |g 16.  |t Making the impossible easy : usable PKI /  |r Dirk Balfanz, Glenn Durfee and D. K. Smetters --  |g 17.  |t Simple desktop security with Chameleon /  |r A. Chris Long and Courtney Moskowitz --  |g 18.  |t Security administration tools and practices /  |r Eser Kandogan and Eben M. Haber --  |g 19.  |t Privacy issues and human-computer interaction /  |r Mark S. Ackerman and Scott D. Mainwaring --  |g 20.  |t A user-centric privacy space framework /  |r Benjamin Brunk --  |g 21.  |t Five pitfalls in the design for privacy /  |r Scott Lederer, Jason I. Hong, Anind K. Dey and James A. Landay --  |g 22.  |t Privacy policies and privacy preferences /  |r Lorrie Faith Cranor --  |g 23.  |t Privacy analysis for the casual user with Bugnosis /  |r David Martin --  |g 24.  |t Informed consent by design /  |r Batya Friedman, Peyina Lin and Jessica K. Miller -- 
505 0 0 |g Part 1  |t Realigning Usability and Security  |g xxi --  |g 1  |t Psychological Acceptability Revisited /   |r Matt Bishop  |g 1 --  |g 2  |t Usable Security /   |r M. Angela Sasse, Ivan Flechais  |g 13 --  |g 3  |t Design for Usability /   |r Bruce Tognazzini  |g 31 --  |g 4  |t Usability Design and Evaluation for Privacy and Security Solutions /   |r Clare-Marie Karat, Carolyn Brodie, John Karat  |g 47 --  |g 5  |t Designing Systems That People Will Trust /   |r Andrew S. Patrick, Pamela Briggs, Stephen Marsh  |g 75 --  |g Part 2  |t Authentication mechanisms  |g 101 --  |g 6  |t Evaluating Authentication Mechanisms /   |r Karen Renaud  |g 103 --  |g 7  |t The Memorability and Security of Passwords /   |r Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant  |g 129 --  |g 8  |t Designing Authentication Systems with Challenge Questions /   |r Mike Just  |g 143 --  |g 9  |t Graphical Passwords /   |r Fabian Monrose, Michael K. Reiter  |g 157 --  |g 10  |t Usable Biometrics /   |r Lynne Coventry  |g 175 --  |g 11  |t Identifying Users from Their Typing Patterns /   |r Alen Peacock, Xian Ke, Matt Wilkerson  |g 199 --  |g 12  |t The Usability of Security Devices /   |r Ugo Piazzalunga, Paolo Salvaneschi, Paolo Coffetti  |g 221 --  |g Part 3  |t Secure Systems  |g 245 --  |g 13  |t Guidelines and Strategies for Secure Interaction Design /   |r Ka-Ping Yee  |g 247 --  |g 14  |t Fighting Phishing at the User Interface /   |r Robert C. Miller, Min Wu  |g 275 --  |g 15  |t Sanitization and Usability /   |r Simson Garfinkel  |g 293 --  |g 16  |t Making the Impossible Easy: Usable PKI /   |r Dirk Balfanz, Glenn Durfee, D. K. Smetters  |g 319 --  |g 17  |t Simple Desktop Security with Chameleon /   |r A. Chris Long, Courtney Moskowitz  |g 335 --  |g 18  |t Security Administration Tools and Practices /   |r Eser Kandogan, Eben M. Haber  |g 357 --  |g Part 4  |t Privacy and Anonymity Systems  |g 379 --  |g 19  |t Privacy Issues and Human-Computer Interaction /   |r Mark S. Ackerman, Scott D. Mainwaring  |g 381 --  |g 20  |t A User-Centric Privacy Space Framework /   |r Benjamin Brunk  |g 401 --  |g 21  |t Five Pitfalls in the Design for Privacy /   |r Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay  |g 421 --  |g 22  |t Privacy Policies and Privacy Preferences /   |r Lorrie Faith Cranor  |g 447 --  |g 23  |t Privacy Analysis for the Casual User with Bugnosis /   |r David Martin  |g 473 --  |g 24  |t Informed Consent by Design /   |r Batya Friedman, Peyina Lin, Jessica K. Miller  |g 495 --  |g 25  |t Social Approaches to End-User Privacy Management /   |r Jeremy Goecks, Elizabeth D. Mynatt  |g 523 --  |g 26  |t Anonymity Loves Company: Usability and the Network Effect /   |r Roger Dingledine, Nick Mathewson  |g 547 --  |g Part 5  |t Commercializing Usability: The Vendor Perspective  |g 561 --  |g 27  |t ZoneAlarm: Creating Usable Security Products for Consumers /   |r Jordy Berson  |g 563 --  |g 28  |t Firefox and the Worry-Free Web /   |r Blake Ross  |g 577 --  |g 29  |t Users and Trust: A Microsoft Case Study /   |r Chris Nodder  |g 589 --  |g 30  |t IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications /   |r Mary Ellen Zurko  |g 607 --  |g 31  |t Achieving Usable Security in Groove Virtual Office /   |r George Moromisato, Paul Boyd, Nimisha Asthagiri  |g 623 --  |g Part 6  |t The Classics  |g 637 --  |g 32  |t Users Are Not the Enemy /   |r Anne Adams, M. Angela Sasse  |g 639 --  |g 33  |t Usability and Privacy: A Study of KaZaA P2P File Sharing /   |r Nathaniel S. Good, Aaron Krekelberg  |g 651 --  |g 34  |t Why Johnny Can't Encrypt /   |r Alma Whitten, J. D. Tygar  |g 669 
505 8 0 |g 25  |t Social approaches to end-user privacy management /  |r Jeremy Goecks and Elizabeth D. Mynatt --  |g 26.  |t Anonymity loves company : usability and the network effect /  |r Roger Dingledine and Nick Mathewson --  |g 27.  |t ZoneAlarm : creating usable security products for consumers /  |r Jordy Berson --  |g 28.  |t Firefox and the worry-free Web /  |r Blake Ross --  |g 29.  |t Users and trust : a Microsoft case study /  |r Chris Nodder --  |g 30.  |t IBM Lotus notes/domino : embedding security in collaborative applications /  |r Mary Ellen Zurko --  |g 31.  |t Achieving usable security in groove virtual office /  |r George Moromisato, Paul Boyd and Nimisha Asthagiri --  |g 32.  |t Users are not the enemy /  |r Anne Adams and M. Angela Sasse --  |g 33.  |t Usability and privacy : a study of KaZaA P2P file sharing /  |r Nathaniel S. Good and Aaron Krekelberg --  |g 34.  |t Why Johnny can't encrypt /  |r Alma Whitten and J. D. Tygar. 
520 |a Computer users have been taught for years that computer security systems can't be effective unless they are complex and difficult to use. In reality, this conventional wisdom is completely wrong. Tomorrow's computers won't be secure unless researchers, designers, and programmers can invent new ways to make security systems easier to use-so easy, in fact, that they seem to melt away entirely 
520 1 |a "Security and Usability provides a window into the future of computer security. The first book describing this emerging and critically important field, it collects 34 groundbreaking essays from leading security, usability, and human-computer interaction (HCI) researchers around the world."--Jacket 
520 8 |a Security and Usability provides a window into the future of computer security. The first book describing this emerging and critically important field, it collects 34 groundbreaking essays from leading security, usability, and human-computer interaction (HCI) researchers around the world. Topics include: Realigning Usability and Security-psychological acceptability, designing for actual (not theoretical) security, tools for usability evaluation, and trust designs and models, Authentication Mechanisms-password memorability, challenge questions, graphical passwords, biometrics, keystroke dynamics, smart cards, and USB tokens, Secure Systems-secure interaction design, anti-phishing, sanitization and usability, usable PKI, compartmentalized security, and ethnographic analysis, Privacy and Anonymity Systems-privacy design pitfalls, the Privacy Space Framework, the Platform for Privacy Preferences (P3P), web bugs, informed consent on the Internet, social approaches to security, and anonymizing technologies, Commercializing Usability-vendor experiences in addressing usability issues at Microsoft, IBM/Lotus, Firefox, Zone Labs, and Groove Networks 
520 8 |a Security and Usability pulls together research findings, actual implementation experiences, practical advice, and recommendations for constructing next-generation applications and operating systems. Edited by Lorrie Faith Cranor, DSc, and Simson Garfinkel, PhD, this volume is destined to become both a classic reference and an inspiration for future research 
530 |a Also available online 
583 1 |a committed to retain  |c 20181001  |d in perpetuity  |f ReCAP Shared Collection  |5 HUL  |8 222091274500003941 
650 0 |a Computer security 
650 2 |a Computer Security 
650 7 |a Computer security  |2 fast 
700 1 |a Cranor, Lorrie Faith  |0 http://viaf.org/viaf/77241407 
700 1 |a Cranor, Lorrie Faith  |1 http://viaf.org/viaf/77241407 
700 1 |a Cranor, Lorrie Faith 
700 1 |a Garfinkel, Simson  |0 http://viaf.org/viaf/34564359 
700 1 |a Garfinkel, Simson  |1 http://viaf.org/viaf/34564359 
700 1 |a Garfinkel, Simson 
776 0 8 |i Online version:  |t Security and usability  |d Beijing ; Farnham ; Sebastopol, CA : O'Reilly, ©2005  |w (OCoLC)607593562 
776 1 |w (OCoLC)657440455 
999 1 0 |i ff5ce685-8068-432d-b156-2e523b8c2a1d  |l 5885123  |s US-ICU  |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p 
999 1 0 |i ff5ce685-8068-432d-b156-2e523b8c2a1d  |l 990013558730106761  |s US-MCM  |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p 
999 1 0 |i ff5ce685-8068-432d-b156-2e523b8c2a1d  |l 990097939080203941  |s US-MH  |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p 
999 1 0 |i ff5ce685-8068-432d-b156-2e523b8c2a1d  |l 5697704  |s US-NIC  |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p 
999 1 0 |i ff5ce685-8068-432d-b156-2e523b8c2a1d  |l 9939106183503681  |s US-PU  |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p 
999 1 1 |l 5885123  |s ISIL:US-ICU  |t BKS  |a JCL-Sci  |b 75124159  |c QA76.9.A25 S3758 2005  |d Library of Congress classification  |y 7983629  |p LOANABLE 
999 1 1 |l 990013558730106761  |s ISIL:US-MCM  |t BKS  |a ENG MOLDREMEDY  |b 39080034775426  |c QA76.9.A25.S3533 2005  |d 0  |x BOOK  |y 23465412620006761  |p UNLOANABLE 
999 1 1 |l 990013558730106761  |s ISIL:US-MCM  |t BKS  |a ENG MOLDREMEDY  |b 39080028585203  |c QA76.9.A25.S3533 2005  |d 0  |x BOOK  |y 23465412630006761  |p UNLOANABLE 
999 1 1 |l 990097939080203941  |s ISIL:US-MH  |t BKS  |a CAB HD  |b 32044079979365  |c QA76.9.A25 S3533 2005  |d 0  |x 01 BOOK  |y 232091274470003941  |p LOANABLE 
999 1 1 |l 5697704  |s ISIL:US-NIC  |t BKS  |a uris  |b 31924102008459  |c QA76.9.A25 S3533 2005  |d lc  |k 1  |x Book  |y 0c709264-7a96-453b-bb25-f9dac4648930  |p LOANABLE 
999 1 1 |l 9939106183503681  |s ISIL:US-PU  |t BKS  |a Libra stor  |b 31198043102669  |c QA76.9.A25 S3533 2005  |d 0  |x BOOK  |y 23386022570003681  |p LOANABLE