Skip to main content
Book cover

People and Computers XII

Proceedings of HCI ’97

  • Conference proceedings
  • © 1997

Overview

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (23 papers)

Keywords

About this book

Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.

Editors and Affiliations

  • Middlesex University, London, UK

    Harold Thimbleby

  • Hewlett-Packard Research Laboratories, Stoke Gifford, Bristol, UK

    Brid O’Conaill

  • Centre for Personal Information Management, University of West of England, Bristol, UK

    Peter J. Thomas

Bibliographic Information

  • Book Title: People and Computers XII

  • Book Subtitle: Proceedings of HCI ’97

  • Editors: Harold Thimbleby, Brid O’Conaill, Peter J. Thomas

  • DOI: https://doi.org/10.1007/978-1-4471-3601-9

  • Publisher: Springer London

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag London 1997

  • Softcover ISBN: 978-3-540-76172-3Published: 15 August 1997

  • eBook ISBN: 978-1-4471-3601-9Published: 14 March 2013

  • Edition Number: 1

  • Number of Pages: XI, 420

  • Number of Illustrations: 51 b/w illustrations

  • Additional Information: Jointly published with British Computer Society

  • Topics: User Interfaces and Human Computer Interaction, Information Systems Applications (incl. Internet)

Publish with us