Jump to ContentJump to Main Navigation
A Vulnerable SystemThe History of Information Security in the Computer Age$
Users without a subscription are not able to see the full content.

Andrew J. Stewart

Print publication date: 2021

Print ISBN-13: 9781501758942

Published to Cornell Scholarship Online: January 2022

DOI: 10.7591/cornell/9781501758942.001.0001

Show Summary Details
Page of

PRINTED FROM Cornell University Press SCHOLARSHIP ONLINE (www.cornell.universitypressscholarship.com). (c) Copyright University of Cornell University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in Cornell for personal use. date: 28 June 2022

Usable Security, Economics, and Psychology

Usable Security, Economics, and Psychology

Chapter:
(p.100) Chapter 6 Usable Security, Economics, and Psychology
Source:
A Vulnerable System
Author(s):

Andrew J. Stewart

Publisher:
Cornell University Press
DOI:10.7591/cornell/9781501758942.003.0007

This chapter addresses how the human user of a computer is in a prime position to act in ways that could compromise the security of the entire system. It looks at the harmful technocratic paternalism at the heart of the field of information security. The RAND Corporation and the early researchers had expected that a computer operating system could impose its will on the users of the computer, in effect forcing them to be secure. That philosophy was adopted by those who worked in the field of information security in the subsequent decades and manifested as a revealed preference for technological solutions. However, with the rise of email and the web, the user and their decisions became crucial to the security of the overall system. The possibility that security could be accomplished through technology alone was revealed to be a machine fantasy. The security of a computer is beholden to the whims of the user, and those whims are driven by the chaotic influence of economic motivations and psychological factors.

Keywords:   computer users, computers, information security, computer operating system, email, web, economics, psychology

Cornell Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.