Skip to main content

Currently Skimming:

2 Framing the Security and Usability Challenges
Pages 7-10

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 7...
... Unfortunately, both are difficult to measure. Cost is partly in dollars budgeted for firewalls, software, and help desks but mostly in the time that users spend typing and reset ­ ting passwords, responding to warnings, finding workarounds so that 
From page 8...
... This need not hurt anonymity unduly, since the third parties can preserve anonymity except when there is trouble, or accept bonds posted in anonymous cash. This scheme is a form of access control: you accept input from me only if I am accountable.
From page 9...
... Consider the physical world of doors and locks mentioned earlier: one can see that they can get in the way of easy access but are tolerated because they seem necessary and because the amount of effort required to open them usually seems reasonable. This example highlights
From page 10...
... Norman suggested that a way to improve security is to design systems that are easy to use for their intended purposes or by the intended people, but difficult for non­autho­ rized people or uses. For these purposes, Norman added, one needs to consider components not normally considered in simple product design: means of authenticating identities or authority, needs, and permissions.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.