In the eye of the beholder: A visualization-based approach to information system security

نویسندگان

  • Rogério Abreu de Paula
  • Xianghua Ding
  • Paul Dourish
  • Kari Nies
  • Ben Pillet
  • David F. Redmiles
  • Jie Ren
  • Jennifer Ann Rode
  • Luiz Roberto Silva Filho
چکیده

Computer system security is traditionally regarded as a primarily technological concern; the fundamental questions to which security researchers address themselves are those of the mathematical guarantees that can be made for the performance of various communication and computational challenges. However, in our research, we focus on a different question. For us, the fundamental security question is one that end-users routinely encounter and resolve for themselves many times a day – the question of whether a system is secure enough for their immediate needs. In this paper, we will describe our explorations of this issue. In particular, we will draw on three major elements of our research to date. The first is empirical investigation into everyday security practices, looking at how people manage security as a practical, day-to-day concern, and exploring the context in which security decisions are made. This empirical work provides a foundation for our reconsideration of the problems of security to a large degree as an interactional problem. The second is our systems approach, based on visualization and event-based architectures. This technical approach provides a broad platform for investigating security and interaction, based on a set of general principles. The third is our initial experiences in a prototype deployment of these mechanisms in an application for peer-to-peer file-sharing in face-to-face collaborative settings. We have been using this application as the basis of an initial evaluation of our technology in support of everyday security practices in collaborative workgroups.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Supplier Selection in Grey Environment: A Grey, AHP, Bulls-Eye and ELECTRE Approach

In recent years, the problem of selecting and evaluating the suppliers in supply chain management has aroused considerable interest in business firms. Owing to the development of information systems, reaching an appropriate decision for adopting discrete methods is a need. The researchers intend to present a new model in this paper as a contributing factor in the grey environment in which the r...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

A new approach for data visualization problem

Data visualization is the process of transforming data, information, and knowledge into visual form, making use of humans’ natural visual capabilities which reveals relationships in data sets that are not evident from the raw data, by using mathematical techniques to reduce the number of dimensions in the data set while preserving the relevant inherent properties. In this paper, we formulated d...

متن کامل

Supplier Selection in Grey Environment: A Grey, AHP, Bulls-Eye and ELECTRE Approach

In recent years, the problem of selecting and evaluating the suppliers in supply chain management has aroused considerable interest in business firms. Owing to the development of information systems, reaching an appropriate decision for adopting discrete methods is a need. The researchers intend to present a new model in this paper as a contributing factor in the grey environment in which the r...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • International Journal of Man-Machine Studies

دوره 63  شماره 

صفحات  -

تاریخ انتشار 2005