Back to Search
Start Over
The security cost of cheap user interaction
- Source :
- NSPW
- Publication Year :
- 2011
- Publisher :
- ACM, 2011.
-
Abstract
- Human attention is a scarce resource, and lack thereof can cause severe security breaches. As most security techniques rely on considerate human intervention in one way or another, this resource should be consumed economically. In this context, we postulate the view that every false alarm or unnecessary user interaction imposes a negative externality on all other potential consumers of this chunk of attention. The paper identifies incentive problems that stimulate overconsumption of human attention in security applications. It further outlines a lump-of-attention model, devised against the backdrop of established theories in the behavioral sciences, and discusses incentive mechanisms to fix the misallocation problem in security notification, for instance the idea of a Pigovian tax on attention consumption.
- Subjects :
- Cloud computing security
Computer science
Human-computer interaction in information security
Security through obscurity
Computer security model
Computer security
computer.software_genre
Asset (computer security)
Security information and event management
Security testing
computer
Countermeasure (computer)
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 2011 New Security Paradigms Workshop
- Accession number :
- edsair.doi...........78282ecae70e534c498b0fa2f4debeca
- Full Text :
- https://doi.org/10.1145/2073276.2073284