Skip to main content

The Balancing Act Between Computer Security and Convenience

  • Conference paper
Human-Computer Interaction. Interaction Design and Usability (HCI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4550))

Included in the following conference series:

  • 2938 Accesses

Abstract

In the past, computer virus writers developed malicious code to become famous. This trend has been steadily changing and we now see a new breed of malicious code that is written with a motivation of financial gain. Computer users are vulnerable to such attacks and security has become one of the domains that affect every computer user. Users often find themselves performing a balancing act between securing their systems and enjoying the “easy life”. Humans are highly task oriented and they tend to discount security if it gets in their way. Some users are unaware of the risks posed by computer viruses/spyware and unprotected networks, while several informed users compromise their security for convenience. With the growing digital infrastructure, the necessity of networking various devices is even more pronounced thereby adding up to the complexities of protecting it. Few users understand the difference between securing their network and protecting their system from viruses and spyware, and the varying degree of security awareness among users translates into inadequate protection for some networks. This paper reports findings from a user research describing the deficiencies and flaws in today’s security software, outlines the user behavior to understand their perspective on computer and network security and describes why security is sometimes compromised for convenience. A “virtual gateway” security service model is also proposed to make security transparent to the users by providing protection at the Internet service provider level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nielsen, J.: Acting on User Research, Alertbox (2004) http://www.useit.com/alertbox/20041108.html

  2. Anderson, G.: Making use of user research, Cooper Interaction Design Newsletter (September 2001) http://www.cooper.com/newsletters/2001_09/making_use_of_user_research.htm

  3. Kuniavsky, M.: Observing the User Experience: A Practitioner’s Guide to User Research, Morgan Kaufmann (2003) ISBN-13: 978-1558609235

    Google Scholar 

  4. Courage, C., Baxter, K.: Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques. Morgan Kaufmann, Washington (2004) ISBN-13: 978-1558609358

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Julie A. Jacko

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ektare, M., Yang, Y. (2007). The Balancing Act Between Computer Security and Convenience. In: Jacko, J.A. (eds) Human-Computer Interaction. Interaction Design and Usability. HCI 2007. Lecture Notes in Computer Science, vol 4550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73105-4_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73105-4_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73104-7

  • Online ISBN: 978-3-540-73105-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics