Security and usability : designing secure systems that people can use /
Computer users have been taught for years that computer security systems can't be effective unless they are complex and difficult to use. In reality, this conventional wisdom is completely wrong. Tomorrow's computers won't be secure unless researchers, designers, and programmers can i...
Other Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Beijing : Farnham :
O'Reilly,
c2005
Beijing ; Sebastapol, CA : c2005 Beijing ; Farnham : [2005] |
Subjects: |
LEADER | 18362nam a2200889 a 4500 | ||
---|---|---|---|
001 | ff5ce685-8068-432d-b156-2e523b8c2a1d | ||
005 | 20240908000000.0 | ||
008 | 050914t20052005cc ac b 001 0 eng | ||
010 | |a 2006271007 | ||
015 | |a GBA578560 |2 bnb | ||
016 | 7 | |a 013293085 |2 Uk | |
020 | |a 0596008279 (pbk.) | ||
020 | |a 0596008279 |q paperback | ||
035 | |a (MCM)001355873MIT01 | ||
035 | |a (OCoLC)61701862 | ||
035 | |a (OCoLC)ocm61701862 | ||
035 | |a (PU)3910618-penndb-Voyager | ||
035 | |a 3910618 | ||
035 | |a 5697704 | ||
040 | |a UKM |b eng |c UKM |d BAKER |d DST |d IXA |d DLC |d UtOrBLW |d OrLoB-B | ||
040 | |a UKM |b eng |c UKM |d BAKER |d DST |d IXA |d MYG |d OrLoB-B | ||
040 | |a UKM |b eng |c UKM |d BAKER |d DST |d IXA | ||
040 | |a UKM |b eng |c UKM |d BAKER |d DST | ||
042 | |a ukblsr |a lccopycat | ||
042 | |a ukblsr | ||
049 | |a MYGG | ||
049 | |a PAUU | ||
050 | 4 | |a QA76.9.A25 |b S3533 2005 | |
050 | 4 | |a QA76.9.A25.S3533 2005 | |
050 | 0 | 0 | |a QA76.9.A25 |b S3758 2005 |
082 | 0 | 4 | |a 005.8 |2 22 |
245 | 0 | 0 | |a Security and usability : |b designing secure systems that people can use / |c edited by Lorrie Faith Cranor & Simson Garfinkel |
260 | |a Beijing : |a Farnham : |b O'Reilly, |c c2005 | ||
260 | |a Beijing ; |a Sebastapol, CA : |b O'Reilly, |c c2005 | ||
264 | 1 | |a Beijing ; |a Farnham : |b O'Reilly, |c [2005] | |
264 | 4 | |c ©2005 | |
300 | |a xviii, 714 p. : |b ill. ; |c 24 cm | ||
300 | |a xviii, 714 p. : |b ill., 2 ports. ; |c 24 cm | ||
300 | |a xviii, 714 pages : |b illustrations, 2 portraits ; |c 24 cm | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a unmediated |b n |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a PERSPECTIVE. Zonealarm: creating usable security products for consumers / Jordy Berson -- Firefox and the worry-free web / Blake Ross -- Users and trust: a microsoft case study / Chris Nodder -- IBM Lotus notes/Domino: embedding security in collaborative applications / Mary Ellen Zurko -- Achieving usable security in Groove Virtual Office / George Moromisato, et al. -- Part Six. THE CLASSICS. Users are not the enemy / Anne Adams and M. Angela Sasse -- Usability and privacy: a study of KaZaA P2P file sharing / Nathaniel S. Good and Aaron Krekelberg -- Why Johnny can't encrypt / Alma Whitten and J.D. Tygar | |
505 | 0 | |a Part One. Realigning usability and security. Psychological acceptability revisited / Matt Bishop -- Usable security / M. Angela Sasse and Ivan Flechais -- Design for usability / Bruce Tognazzini -- Usability design and evaluation for privacy and security solutions / Clare-Marie Karat, Carolyn Brodie, and John Karat -- Designing systems that people will trust / Andrew S. Patrick, Pamela Briggs, and Stephen Marsh. Part Two. AUTHENTICATION MECHANISMS. Evaluating authentication mechanisms / Karen Renaud -- The memorability and security of passwords / Jeff Yan, et al. -- Designing authentication systems with challenge questions / Mike Just -- Graphical passwords / Fabian Monrose and Michael K. Reiter -- Usable biometrics / Lynne Coventry -- Identifying users from their typing patterns / Alen Peacock, et al. -- The usability of security devices / Ugo Piazzalunga, et al. -- Guidelines and strategies for secure interaction design / Ka-Ping Yee -- Fighting phishing at the user interface / Robert C. Miller and Min Wu -- Sanitization and usability / Simson Garfinkel -- Making the impossible easy: usable PKI / Dirk Balfanz, et al. -- Simple desktop security with Chameleon / A. Chris Long and Courtney Moskowitz -- Security administration tools and practices / Eser Kandogan and Eben M. Haber. Part Four. PRIVACY AND ANONYMITY SYSTEMS. Privacy issues and human-computer interaction / Mark S. Ackerman and Scott D. Mainwaring -- A user-centric privacy space framework / Benjamin Brunk -- Five pitfalls in the design for privacy / Scott Lederer, et al. -- Privacy policies and privacy preferences / Lorrie Faith Cranor -- Privacy analysis for the casual user with Bugnosis / David Martin -- Informed consent by design / Batya Friedman, et al. -- Social approaches to end-user privacy management / Jeremy Goecks and Elizabeth D. Mynatt -- Anonymity loves company: usability and the network effect / Roger Dingledine and Nick Mathewson. Part Five. COMMERCIALIZING USABILITY: THE VENDOR | |
505 | 0 | 0 | |g 1 |t Psychological acceptability revisited / |r Matt Bishop -- |g 2. |t Usable security / |r M. Angela Sasse and Ivan Flechais -- |g 3. |t Design for usability / |r Bruce Tognazzini -- |g 4. |t Usability design and evaluation for privacy and security solutions / |r Clare-Marie Karat, Carolyn Brodie and John Karat -- |g 5. |t Designing systems that people will trust / |r Andrew S. Patrick, Pamela Briggs and Stephen Marsh -- |g 6. |t Evaluating authentication mechanisms / |r Karen Renaud -- |g 7. |t The memorability and security of passwords / |r Jeff Yan, Alan Blackwell, Ross Anderson and Alasdair Grant -- |g 8. |t Designing authentication systems with challenge questions / |r Mike Just -- |g 9. |t Graphical passwords / |r Fabian Monrose and Michael K. Reiter -- |g 10. |t Usable biometrics / |r Lynne Coventry -- |g 11. |t Identifying users from their typing patterns / |r Alen Peacock, Xian Ke and Matt Wilkerson -- |g 12. |t The usability of security devices / |r Ugo Piazzalunga, Paola Salvaneschi and Paolo Coffetti -- |g 13. |t Guidelines and strategies for secure interaction design / |r Ka-Ping Yee -- |g 14. |t Fighting phishing at the user interface / |r Robert C. Miller and Min Wu -- |g 15. |t Sanitization and usability / |r Simson Garfinkel -- |g 16. |t Making the impossible easy : usable PKI / |r Dirk Balfanz, Glenn Durfee and D. K. Smetters -- |g 17. |t Simple desktop security with Chameleon / |r A. Chris Long and Courtney Moskowitz -- |g 18. |t Security administration tools and practices / |r Eser Kandogan and Eben M. Haber -- |g 19. |t Privacy issues and human-computer interaction / |r Mark S. Ackerman and Scott D. Mainwaring -- |g 20. |t A user-centric privacy space framework / |r Benjamin Brunk -- |g 21. |t Five pitfalls in the design for privacy / |r Scott Lederer, Jason I. Hong, Anind K. Dey and James A. Landay -- |g 22. |t Privacy policies and privacy preferences / |r Lorrie Faith Cranor -- |g 23. |t Privacy analysis for the casual user with Bugnosis / |r David Martin -- |g 24. |t Informed consent by design / |r Batya Friedman, Peyina Lin and Jessica K. Miller -- |g 25. |t Social approaches to end-user privacy management / |r Jeremy Goecks and Elizabeth D. Mynatt -- |g 26. |t Anonymity loves company : usability and the network effect / |r Roger Dingledine and Nick Mathewson -- |g 27. |t ZoneAlarm : creating usable security products for consumers / |r Jordy Berson -- |g 28. |t Firefox and the worry-free Web / |r Blake Ross -- |g 29. |t Users and trust : a Microsoft case study / |r Chris Nodder -- |g 30. |t IBM Lotus notes/domino : embedding security in collaborative applications / |r Mary Ellen Zurko -- |g 31. |t Achieving usable security in groove virtual office / |r George Moromisato, Paul Boyd and Nimisha Asthagiri -- |g 32. |t Users are not the enemy / |r Anne Adams and M. Angela Sasse -- |g 33. |t Usability and privacy : a study of KaZaA P2P file sharing / |r Nathaniel S. Good and Aaron Krekelberg -- |g 34. |t Why Johnny can't encrypt / |r Alma Whitten and J. D. Tygar. |
505 | 0 | 0 | |g 1 |t Psychological acceptability revisited / |r Matt Bishop -- |g 2. |t Usable security / |r M. Angela Sasse and Ivan Flechais -- |g 3. |t Design for usability / |r Bruce Tognazzini -- |g 4. |t Usability design and evaluation for privacy and security solutions / |r Clare-Marie Karat, Carolyn Brodie and John Karat -- |g 5. |t Designing systems that people will trust / |r Andrew S. Patrick, Pamela Briggs and Stephen Marsh -- |g 6. |t Evaluating authentication mechanisms / |r Karen Renaud -- |g 7. |t The memorability and security of passwords / |r Jeff Yan, Alan Blackwell, Ross Anderson and Alasdair Grant -- |g 8. |t Designing authentication systems with challenge questions / |r Mike Just -- |g 9. |t Graphical passwords / |r Fabian Monrose and Michael K. Reiter -- |g 10. |t Usable biometrics / |r Lynne Coventry -- |g 11. |t Identifying users from their typing patterns / |r Alen Peacock, Xian Ke and Matt Wilkerson -- |g 12. |t The usability of security devices / |r Ugo Piazzalunga, Paola Salvaneschi and Paolo Coffetti -- |g 13. |t Guidelines and strategies for secure interaction design / |r Ka-Ping Yee -- |g 14. |t Fighting phishing at the user interface / |r Robert C. Miller and Min Wu -- |g 15. |t Sanitization and usability / |r Simson Garfinkel -- |g 16. |t Making the impossible easy : usable PKI / |r Dirk Balfanz, Glenn Durfee and D. K. Smetters -- |g 17. |t Simple desktop security with Chameleon / |r A. Chris Long and Courtney Moskowitz -- |g 18. |t Security administration tools and practices / |r Eser Kandogan and Eben M. Haber -- |g 19. |t Privacy issues and human-computer interaction / |r Mark S. Ackerman and Scott D. Mainwaring -- |g 20. |t A user-centric privacy space framework / |r Benjamin Brunk -- |g 21. |t Five pitfalls in the design for privacy / |r Scott Lederer, Jason I. Hong, Anind K. Dey and James A. Landay -- |g 22. |t Privacy policies and privacy preferences / |r Lorrie Faith Cranor -- |g 23. |t Privacy analysis for the casual user with Bugnosis / |r David Martin -- |g 24. |t Informed consent by design / |r Batya Friedman, Peyina Lin and Jessica K. Miller -- |
505 | 0 | 0 | |g Part 1 |t Realigning Usability and Security |g xxi -- |g 1 |t Psychological Acceptability Revisited / |r Matt Bishop |g 1 -- |g 2 |t Usable Security / |r M. Angela Sasse, Ivan Flechais |g 13 -- |g 3 |t Design for Usability / |r Bruce Tognazzini |g 31 -- |g 4 |t Usability Design and Evaluation for Privacy and Security Solutions / |r Clare-Marie Karat, Carolyn Brodie, John Karat |g 47 -- |g 5 |t Designing Systems That People Will Trust / |r Andrew S. Patrick, Pamela Briggs, Stephen Marsh |g 75 -- |g Part 2 |t Authentication mechanisms |g 101 -- |g 6 |t Evaluating Authentication Mechanisms / |r Karen Renaud |g 103 -- |g 7 |t The Memorability and Security of Passwords / |r Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant |g 129 -- |g 8 |t Designing Authentication Systems with Challenge Questions / |r Mike Just |g 143 -- |g 9 |t Graphical Passwords / |r Fabian Monrose, Michael K. Reiter |g 157 -- |g 10 |t Usable Biometrics / |r Lynne Coventry |g 175 -- |g 11 |t Identifying Users from Their Typing Patterns / |r Alen Peacock, Xian Ke, Matt Wilkerson |g 199 -- |g 12 |t The Usability of Security Devices / |r Ugo Piazzalunga, Paolo Salvaneschi, Paolo Coffetti |g 221 -- |g Part 3 |t Secure Systems |g 245 -- |g 13 |t Guidelines and Strategies for Secure Interaction Design / |r Ka-Ping Yee |g 247 -- |g 14 |t Fighting Phishing at the User Interface / |r Robert C. Miller, Min Wu |g 275 -- |g 15 |t Sanitization and Usability / |r Simson Garfinkel |g 293 -- |g 16 |t Making the Impossible Easy: Usable PKI / |r Dirk Balfanz, Glenn Durfee, D. K. Smetters |g 319 -- |g 17 |t Simple Desktop Security with Chameleon / |r A. Chris Long, Courtney Moskowitz |g 335 -- |g 18 |t Security Administration Tools and Practices / |r Eser Kandogan, Eben M. Haber |g 357 -- |g Part 4 |t Privacy and Anonymity Systems |g 379 -- |g 19 |t Privacy Issues and Human-Computer Interaction / |r Mark S. Ackerman, Scott D. Mainwaring |g 381 -- |g 20 |t A User-Centric Privacy Space Framework / |r Benjamin Brunk |g 401 -- |g 21 |t Five Pitfalls in the Design for Privacy / |r Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay |g 421 -- |g 22 |t Privacy Policies and Privacy Preferences / |r Lorrie Faith Cranor |g 447 -- |g 23 |t Privacy Analysis for the Casual User with Bugnosis / |r David Martin |g 473 -- |g 24 |t Informed Consent by Design / |r Batya Friedman, Peyina Lin, Jessica K. Miller |g 495 -- |g 25 |t Social Approaches to End-User Privacy Management / |r Jeremy Goecks, Elizabeth D. Mynatt |g 523 -- |g 26 |t Anonymity Loves Company: Usability and the Network Effect / |r Roger Dingledine, Nick Mathewson |g 547 -- |g Part 5 |t Commercializing Usability: The Vendor Perspective |g 561 -- |g 27 |t ZoneAlarm: Creating Usable Security Products for Consumers / |r Jordy Berson |g 563 -- |g 28 |t Firefox and the Worry-Free Web / |r Blake Ross |g 577 -- |g 29 |t Users and Trust: A Microsoft Case Study / |r Chris Nodder |g 589 -- |g 30 |t IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications / |r Mary Ellen Zurko |g 607 -- |g 31 |t Achieving Usable Security in Groove Virtual Office / |r George Moromisato, Paul Boyd, Nimisha Asthagiri |g 623 -- |g Part 6 |t The Classics |g 637 -- |g 32 |t Users Are Not the Enemy / |r Anne Adams, M. Angela Sasse |g 639 -- |g 33 |t Usability and Privacy: A Study of KaZaA P2P File Sharing / |r Nathaniel S. Good, Aaron Krekelberg |g 651 -- |g 34 |t Why Johnny Can't Encrypt / |r Alma Whitten, J. D. Tygar |g 669 |
505 | 8 | 0 | |g 25 |t Social approaches to end-user privacy management / |r Jeremy Goecks and Elizabeth D. Mynatt -- |g 26. |t Anonymity loves company : usability and the network effect / |r Roger Dingledine and Nick Mathewson -- |g 27. |t ZoneAlarm : creating usable security products for consumers / |r Jordy Berson -- |g 28. |t Firefox and the worry-free Web / |r Blake Ross -- |g 29. |t Users and trust : a Microsoft case study / |r Chris Nodder -- |g 30. |t IBM Lotus notes/domino : embedding security in collaborative applications / |r Mary Ellen Zurko -- |g 31. |t Achieving usable security in groove virtual office / |r George Moromisato, Paul Boyd and Nimisha Asthagiri -- |g 32. |t Users are not the enemy / |r Anne Adams and M. Angela Sasse -- |g 33. |t Usability and privacy : a study of KaZaA P2P file sharing / |r Nathaniel S. Good and Aaron Krekelberg -- |g 34. |t Why Johnny can't encrypt / |r Alma Whitten and J. D. Tygar. |
520 | |a Computer users have been taught for years that computer security systems can't be effective unless they are complex and difficult to use. In reality, this conventional wisdom is completely wrong. Tomorrow's computers won't be secure unless researchers, designers, and programmers can invent new ways to make security systems easier to use-so easy, in fact, that they seem to melt away entirely | ||
520 | 1 | |a "Security and Usability provides a window into the future of computer security. The first book describing this emerging and critically important field, it collects 34 groundbreaking essays from leading security, usability, and human-computer interaction (HCI) researchers around the world."--Jacket | |
520 | 8 | |a Security and Usability provides a window into the future of computer security. The first book describing this emerging and critically important field, it collects 34 groundbreaking essays from leading security, usability, and human-computer interaction (HCI) researchers around the world. Topics include: Realigning Usability and Security-psychological acceptability, designing for actual (not theoretical) security, tools for usability evaluation, and trust designs and models, Authentication Mechanisms-password memorability, challenge questions, graphical passwords, biometrics, keystroke dynamics, smart cards, and USB tokens, Secure Systems-secure interaction design, anti-phishing, sanitization and usability, usable PKI, compartmentalized security, and ethnographic analysis, Privacy and Anonymity Systems-privacy design pitfalls, the Privacy Space Framework, the Platform for Privacy Preferences (P3P), web bugs, informed consent on the Internet, social approaches to security, and anonymizing technologies, Commercializing Usability-vendor experiences in addressing usability issues at Microsoft, IBM/Lotus, Firefox, Zone Labs, and Groove Networks | |
520 | 8 | |a Security and Usability pulls together research findings, actual implementation experiences, practical advice, and recommendations for constructing next-generation applications and operating systems. Edited by Lorrie Faith Cranor, DSc, and Simson Garfinkel, PhD, this volume is destined to become both a classic reference and an inspiration for future research | |
530 | |a Also available online | ||
583 | 1 | |a committed to retain |c 20181001 |d in perpetuity |f ReCAP Shared Collection |5 HUL |8 222091274500003941 | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Cranor, Lorrie Faith |0 http://viaf.org/viaf/77241407 | |
700 | 1 | |a Cranor, Lorrie Faith |1 http://viaf.org/viaf/77241407 | |
700 | 1 | |a Cranor, Lorrie Faith | |
700 | 1 | |a Garfinkel, Simson |0 http://viaf.org/viaf/34564359 | |
700 | 1 | |a Garfinkel, Simson |1 http://viaf.org/viaf/34564359 | |
700 | 1 | |a Garfinkel, Simson | |
776 | 0 | 8 | |i Online version: |t Security and usability |d Beijing ; Farnham ; Sebastopol, CA : O'Reilly, ©2005 |w (OCoLC)607593562 |
776 | 1 | |w (OCoLC)657440455 | |
999 | 1 | 0 | |i ff5ce685-8068-432d-b156-2e523b8c2a1d |l 5885123 |s US-ICU |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p |
999 | 1 | 0 | |i ff5ce685-8068-432d-b156-2e523b8c2a1d |l 990013558730106761 |s US-MCM |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p |
999 | 1 | 0 | |i ff5ce685-8068-432d-b156-2e523b8c2a1d |l 990097939080203941 |s US-MH |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p |
999 | 1 | 0 | |i ff5ce685-8068-432d-b156-2e523b8c2a1d |l 5697704 |s US-NIC |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p |
999 | 1 | 0 | |i ff5ce685-8068-432d-b156-2e523b8c2a1d |l 9939106183503681 |s US-PU |m security_and_usabilitydesigning_secure_systems_that_people_can_use_________2005_______oreila___________________________________________________________________________p |
999 | 1 | 1 | |l 5885123 |s ISIL:US-ICU |t BKS |a JCL-Sci |b 75124159 |c QA76.9.A25 S3758 2005 |d Library of Congress classification |y 7983629 |p LOANABLE |
999 | 1 | 1 | |l 990013558730106761 |s ISIL:US-MCM |t BKS |a ENG MOLDREMEDY |b 39080034775426 |c QA76.9.A25.S3533 2005 |d 0 |x BOOK |y 23465412620006761 |p UNLOANABLE |
999 | 1 | 1 | |l 990013558730106761 |s ISIL:US-MCM |t BKS |a ENG MOLDREMEDY |b 39080028585203 |c QA76.9.A25.S3533 2005 |d 0 |x BOOK |y 23465412630006761 |p UNLOANABLE |
999 | 1 | 1 | |l 990097939080203941 |s ISIL:US-MH |t BKS |a CAB HD |b 32044079979365 |c QA76.9.A25 S3533 2005 |d 0 |x 01 BOOK |y 232091274470003941 |p LOANABLE |
999 | 1 | 1 | |l 5697704 |s ISIL:US-NIC |t BKS |a uris |b 31924102008459 |c QA76.9.A25 S3533 2005 |d lc |k 1 |x Book |y 0c709264-7a96-453b-bb25-f9dac4648930 |p LOANABLE |
999 | 1 | 1 | |l 9939106183503681 |s ISIL:US-PU |t BKS |a Libra stor |b 31198043102669 |c QA76.9.A25 S3533 2005 |d 0 |x BOOK |y 23386022570003681 |p LOANABLE |