没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
Mismorphism: a Semiotic Model of Computer SecurityCircumvention (Extended Version)Computer Science Technical Report TR2015-768Dartmouth CollegeS.W. SmithDartmouth College sws@cs.dartmouth.eduR. KoppelUniversity of Pennsylvania rkoppel@sas.upenn.eduJ. BlytheUniversity of Southern California blythe@isi.eduV. KothariDartmouth College Vijay.H.Kothari.GR@dartmouth.eduMarch 2015AbstractIn real world domains, from healthcare to power to finance, we deploy computer systems intended to streamline and imp
资源推荐
资源详情
资源评论
Mismorphism: a Semiotic Model of Computer Security
Circumvention (Extended Version)
Computer Science Technical Report TR2015-768
Dartmouth College
S.W. Smith
Dartmouth College
sws@cs.dartmouth.edu
R. Koppel
University of Pennsylvania
rkoppel@sas.upenn.edu
J. Blythe
University of Southern California
blythe@isi.edu
V. Kothari
Dartmouth College
Vijay.H.Kothari.GR@dartmouth.edu
March 2015
Abstract
In real world domains, from healthcare to power to finance, we deploy computer systems intended to
streamline and improve the activities of human agents in the corresponding non-cyber worlds. However,
talking to actual users (instead of just computer security experts) reveals endemic circumvention of the
computer-embedded rules. Go od-intentioned users, trying to get their jobs done, systematically work
around security and other controls embedded in their IT systems.
This paper reports on our work compiling a large corpus of such incidents and developing a model
based on semiotic triads to examine security circumvention. This model suggests that mismorphisms—
mappings that fail to preserve structure—lie at the heart of circumvention scenarios; differential percep-
tions and needs explain users’ actions. We support this claim with empirical data from the corpus.
1 Introduction
Users systematically work around security controls. We can pretend this doesn’t happen, but it does. In our
research, we address this problem via observation and grounded theory (Bernard and Ryan, 2010; Charmaz,
2003; Pettigrew, 2000). Rather than assuming that users behave perfectly or that only bad users do bad
things, we instead observe and record what really goes on compared to the various expectations. Then, after
reviewing data, we develop structure and models, and bring in additional data to support, reject and refine
these models.
Over the last several years, via interviews, observations, surveys, and literature searches, we have explored the
often tenuous relationship among c omputer rules, users’ needs, and designers’ goals of computer systems. We
have collected and analyzed a corpus of hundreds of circumvention and unusability scenarios. We categorized
296 examples of these “misunderstandings” and the circumventions users undertook to accomplish their
needed tasks. We derived the examples from 285 different sources and categorized them into 60 fine-grained
codes. Because several examples reflect multiple codes, there were 646 applications of the codes linked to the
examples; e.g., the e xample of a woman with a hysterectomy listed in the current record as having an intact,
normal womb was coded as: 1. A copy-and-paste issue (bec ause the “current” record reflected an earlier
examination from before her recent surgery); and 2. The I T not representing the reality. Most examples
had only one or two codes associated with them; some had as many as four.
Semiotic triads, proposed almost a century ago (e.g., Ogden and Richards, 1927), offer models to help un-
derstand why human agents so often circumvent computer-embedded rules. The triads reflect the differences
and similarities among: a) what the speaker/listener is thinking, b) what words or symbols are used to
convey those thoughts, and c) what is the reality or the thing to which they are referring. We suggest that
these triads provide a framework to illuminate, organize, and analyze circumvention problems.
This Paper In this pap er, we present these ideas and support them with examples from our corpus.
Examples where we don’t cite a source came from interviews with parties who wish to remain anonymous.
As we are working on developing a typology rather than supporting a hypothesis, many of the usual factors in
confirmation bias to do not apply. Section 2 presents our model of how users’ actions will often differ from the
expectations of the security designers. Section 3 hypothesizes how our model of differential perceptions and
needs explains users’ actions and non-linear/non-monotonic responses to increases in turning the security
knob higher. Section 4 and Section 5 then supports these hypotheses with data item from our corpus.
Section 6 considers some related work, and Section 7 concludes.
2
2 A Semiotic Model for IT Usability Trouble
In a previous paper (Smith and Koppel, 2014) that organized an earlier corpus of usability problems in
health IT into a coherent typology, we considered three sets:
• the mental model of the clinician working with the patient and the health IT system;
• the representation of medical reality in the health IT system;
• and the actual medical reality of patients;
Usability problems organized nicely according to mismatches between the expressiveness of the representation
“language” and the details of reality– between how a clinician’s mental model works with the representations
and reality.
Somewhat to our chagrin, we discovered we were scooped by almost a century. In their seminal 1920s work
on the meaning of language, Ogden and Richards (1927) constructed what is sometimes called the semiotic
triad. The vertices are the three principal objects:
• What the speaker (or listener/reader) thinks
• The symbol they use
• The actual item to which they are referring
Much of Ogden and Richard’s analysis stems from the observation that there is not a direct connection from
symbol to referent. Rather, when speaking or writing, the referent maps into the me ntal model of the speaker
and then into the symbol; when reading (or listening), the symbol maps into the reader’s (listener’s) mental
model, which then projects to a referent, but not necessarily the same one. For example, Alice may think
of “Mexico” when she writes “this country,” but when Bob reads those works, he thinks of “Canada”—and
(besides not being Mexico) his imagined Canada may differ substantially from the real one.
As we now consider a new corpus of scenarios in security circumvention and other authentication misadven-
tures, we hypothesize that this framework will also apply. We have a set of IT systems. Each system serves
a set of users , and mediates access between these users and a cross-product of actions and resources. Each
system has an IT administrator who worries about the security configuration—as well as users who worry
about trying to use the resulting system for their actual work. For different systems, the user sets are not
necessarily disjoint.
The interaction between the reality, the IT representation, and the mental models corres pond to the vertices
in Ogden and Richards’ triad:
• Thought. The mental model a party has about the actions users can and cannot (or should and should
not) do with resources.
• Symbol (i.e. configuration): The representation of security policy within the IT system itself; the built-
in functionality of the IT system, intended to express the correct workflow. (Here, we mean policy as
the actual machine-actionable expression of admin intention, not a published instructional document.)
• Referent (i.e. reality) The actions users can and cannot do w ith the resources, in reality; the de facto
allowed workflow.
Figure 1-a sketches this basic triad. In this framework, the primary mappings are counterclockwise:
3
剩余19页未读,继续阅读
资源评论
weixin_38746442
- 粉丝: 8
- 资源: 960
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于滑动窗口模型的合作结构分析及队伍战略优化 -以足球比赛为例
- java多商户版健身房saas管理系统 含小程序、总后台管理、多商户前后端分离的后端接口api,用户于健身房工作人员小程序api.zip
- 足球比赛中基于社会网络分析的团队表现改进模型
- 【小程序毕业设计】互动打卡小程序源码(完整前后端+mysql+说明文档).zip
- 基于网络科学与回归模型的足球队伍合作表现量化分析
- 基于传球网络与对抗回归评估足球团队合作表现的综合研究
- 足球团队多级网络与性能评估模型及其实际应用
- JavaScript 每周一个小程序.zip
- c语言基于51单片机设计的火灾报警器源码(包含labview的上位机)高分项目
- USB的UAC设备开发(STM32)
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功