Authors:
Ka-Ping Yee
Computer security can be described in two different ways: keeping users away from dangerous things, or enabling users to do useful things safely. The former perspective is attack-oriented; the latter is task-oriented. In the attack-oriented mindset, users trudge along a dark path through the jungle, fraught with perils at every turn: viruses, Trojan horses, spyware, and email scams are the deadly snakes and poisonous spiders of computer security. Like a guardian angel, from time to time security software swoops down to vanquish the enemy or stop the user from doing something stupid. This is the picture that the news…
You must be a member of SIGCHI, a subscriber to ACM's Digital Library, or an interactions subscriber to read the full text of this article.
GET ACCESS
Join ACM SIGCHIIn addition to all of the professional benefits of being a SIGCHI member, members get full access to interactions online content and receive the print version of the magazine bimonthly.
Subscribe to the ACM Digital Library
Get access to all interactions content online and the entire archive of ACM publications dating back to 1954. (Please check with your institution to see if it already has a subscription.)
Subscribe to interactions
Get full access to interactions online content and receive the print version of the magazine bimonthly.
Post Comment
No Comments Found