Logo des Repositoriums
 

On some conjectures in IT security: the case for viable security solution

dc.contributor.authorZibuschka, Jan
dc.contributor.authorRoßnagel, Heiko
dc.contributor.editorSuri, Neeraj
dc.contributor.editorWaidner, Michael
dc.date.accessioned2018-11-19T13:11:44Z
dc.date.available2018-11-19T13:11:44Z
dc.date.issued2012
dc.description.abstractDue to the increased utilization of computers and the Internet the importance of IT security has also increased. Naturally the field of IT security has grown significantly and has provided many valuable contributions in recent years. Most of the work is concerned with the design of systems offering strong technological security. With regard to behavioural factors, researchers build their work on assumptions about human behaviour that are prevalent in the field of IT security without considering the results and insights of related disciplines. In this contribution we challenge some of these widely held conjectures and offer alternative interpretations based on the results of neighbouring disciplines. Based on this analysis, we suggest new directions for the design of security solutions that support the inclusion of insights from reference disciplines during the design process.en
dc.identifier.isbn978-3-88579-289-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/18285
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSICHERHEIT 2012 – Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-195
dc.titleOn some conjectures in IT security: the case for viable security solutionen
dc.typeText/Conference Paper
gi.citation.endPage33
gi.citation.publisherPlaceBonn
gi.citation.startPage25
gi.conference.date7.-9. März 2012
gi.conference.locationDarmstadt
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
25.pdf
Größe:
140.13 KB
Format:
Adobe Portable Document Format