Abstract
In the past, computer virus writers developed malicious code to become famous. This trend has been steadily changing and we now see a new breed of malicious code that is written with a motivation of financial gain. Computer users are vulnerable to such attacks and security has become one of the domains that affect every computer user. Users often find themselves performing a balancing act between securing their systems and enjoying the “easy life”. Humans are highly task oriented and they tend to discount security if it gets in their way. Some users are unaware of the risks posed by computer viruses/spyware and unprotected networks, while several informed users compromise their security for convenience. With the growing digital infrastructure, the necessity of networking various devices is even more pronounced thereby adding up to the complexities of protecting it. Few users understand the difference between securing their network and protecting their system from viruses and spyware, and the varying degree of security awareness among users translates into inadequate protection for some networks. This paper reports findings from a user research describing the deficiencies and flaws in today’s security software, outlines the user behavior to understand their perspective on computer and network security and describes why security is sometimes compromised for convenience. A “virtual gateway” security service model is also proposed to make security transparent to the users by providing protection at the Internet service provider level.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Nielsen, J.: Acting on User Research, Alertbox (2004) http://www.useit.com/alertbox/20041108.html
Anderson, G.: Making use of user research, Cooper Interaction Design Newsletter (September 2001) http://www.cooper.com/newsletters/2001_09/making_use_of_user_research.htm
Kuniavsky, M.: Observing the User Experience: A Practitioner’s Guide to User Research, Morgan Kaufmann (2003) ISBN-13: 978-1558609235
Courage, C., Baxter, K.: Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques. Morgan Kaufmann, Washington (2004) ISBN-13: 978-1558609358
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ektare, M., Yang, Y. (2007). The Balancing Act Between Computer Security and Convenience. In: Jacko, J.A. (eds) Human-Computer Interaction. Interaction Design and Usability. HCI 2007. Lecture Notes in Computer Science, vol 4550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73105-4_80
Download citation
DOI: https://doi.org/10.1007/978-3-540-73105-4_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73104-7
Online ISBN: 978-3-540-73105-4
eBook Packages: Computer ScienceComputer Science (R0)