Cybersecurity systems are complex. Given the diversity of stakeholders and the variety of system uses, it is unlikely that some magic bullet will eradicate our security concerns. The successful security of our cyber-physical systems depends on corporations and government agencies working together to identify threats, possible future weaknesses, and timely solutions. Some headway has been made in this regard, with cybersecurity committees meeting to create meaningful policies and a platform for confidential information sharing. However, many of these initiatives focus on systems and technology, without addressing well-known user compliance issues. This negligence is due not to a lack of interest…
You must be a member of SIGCHI, a subscriber to ACMís Digital Library, or an interactions subscriber to read the full text of this article.LOG IN TO READ THE FULL ARTICLE
GET ACCESSJoin ACM SIGCHI
In addition to all of the professional benefits of being a SIGCHI member, members get full access to interactionsí online content and receive the print version of the magazine bimonthly.
Subscribe to the ACM Digital Library
Get access to all interactions content online and the entire archive of ACM publications dating back to 1954. (Please check with your institution to see if it already has a subscription.)
Subscribe to interactions
Get full access to interactionsí online content and receive the print version of the magazine bimonthly.