Users Are Not The Enemy: Why users compromise computer security mechanisms and how to take remedial measures

Users Are Not The Enemy: Why users compromise computer security mechanisms and how to take remedial measures

December 1999 | Anne Adams and Martina Angela Sasse
The article "Users Are Not The Enemy" explores why users often compromise computer security mechanisms and suggests remedial measures. It highlights that traditional authentication procedures, such as passwords, are often ineffective due to human factors and poor user behavior. The study, based on a web-based questionnaire and in-depth interviews, identifies four major factors influencing effective password usage: multiple passwords, password content, perceived compatibility with work practices, and users' perceptions of organizational security and information sensitivity. Key findings include: 1. **Multiple Passwords**: Users struggle with remembering multiple passwords, leading to insecure practices like writing them down. 2. **Password Content**: Users often create insecure passwords due to inadequate knowledge about secure password practices. 3. **Perceived Compatibility with Work Practices**: Incompatible password procedures with work practices can lead to users circumventing security measures. 4. **Users' Perceptions of Security**: Users' lack of awareness and understanding of security issues can lead to insecure behaviors. The article recommends user-centered design in security mechanisms, providing clear instructions and training on password construction, reducing the number of passwords, ensuring visibility and communication about security, and aligning password procedures with organizational and work practices. These recommendations aim to improve user compliance and overall security.The article "Users Are Not The Enemy" explores why users often compromise computer security mechanisms and suggests remedial measures. It highlights that traditional authentication procedures, such as passwords, are often ineffective due to human factors and poor user behavior. The study, based on a web-based questionnaire and in-depth interviews, identifies four major factors influencing effective password usage: multiple passwords, password content, perceived compatibility with work practices, and users' perceptions of organizational security and information sensitivity. Key findings include: 1. **Multiple Passwords**: Users struggle with remembering multiple passwords, leading to insecure practices like writing them down. 2. **Password Content**: Users often create insecure passwords due to inadequate knowledge about secure password practices. 3. **Perceived Compatibility with Work Practices**: Incompatible password procedures with work practices can lead to users circumventing security measures. 4. **Users' Perceptions of Security**: Users' lack of awareness and understanding of security issues can lead to insecure behaviors. The article recommends user-centered design in security mechanisms, providing clear instructions and training on password construction, reducing the number of passwords, ensuring visibility and communication about security, and aligning password procedures with organizational and work practices. These recommendations aim to improve user compliance and overall security.
Reach us at info@study.space
[slides and audio] Users are not the enemy