The Association of Digital Forensics, Security and Law (ADFSL)


It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.


ABS. (2012). Type of Access Connection. Retrieved January 12, 2012, from http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/8153.0Chapter3Dec%20201 1

Ajzen, M. F. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, N.J: Prentice-Hall.

Andersson, K., & Szewczyk, P. (2011). Insecurity by Obscrutiy Continues: Are ADSL router manuals putting end-users at risk. Paper presented at the 9th Australian Information Security Management Conference.

BackTrack. (2012). BackTrack Linux - Penetration Testing Distribution. Retrieved March 5, 2012, from http://www.backtrack-linux.org/

Berson, J. (2005). ZoneAlarm: Creating Usable Security Products for Consumers. In L. F. Cranor & S. Garfinkel (Eds.), Security and Usability: Designing Security Systems That People Can Use. North Sebastopol, CA: O'Reilly Media.

Brand, M., Valli, C., & Woodward, A. (2010). Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42.

Čeleda, P., Krejčí, R., Vykopal, J., & Drašar, M. (2010). Embedded Malware - An Analysis of the Chuck Norris Botnet Paper presented at the 2010 European Conference on Computer Network Defense (EC2ND), Technische Universität Berlin, Germany.

Cook, D., Szewczyk, P., & Sansurooah, K. (2011). Seniors Language Paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens. Paper presented at the 9th Australian Information Security and Management Conference, Citigate Hotel, Perth, Western Australia.

Cyveillance. (2010). Malware Detection Rates for Leading Malware Solutions. Retrieved April 5, 2011, from http://www.cyveillance.com/web/docs /WP_MalwareDetectionRates.pdf

DBCDE. (2011). What is the NBN? Retrieved October 20, 2011, from http://www.nbn.gov.au/about-the-nbn/what-is-the-nbn/

Eagly, A. H., & Chaiken, S. (1993). The Psychology of Attitudes. Orlando, FL: Harcourt Brace Jovanovich.

Get Safe Online. (2012). Get Safe Online. Retrieved January 14, 2012, from http://www.getsafeonline.org/

Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education.

Hutchinson, N. (2012, February 14). Free WiFi on horizon. Guardian Express, p. 1.

Jacobsson, S. (2012). Facebook Timeline Privacy Tips: Locak Down Your Profile. Retrieved January 21, 2012, from http://www.pcworld.com/article/249019 /facebook_timeline_privacy_tips_lock_down_your_profile.html

Nahorney, B. (2009). Linux.Psybot—Is Your Router Secure? Retrieved November 21, 2011, from http://www.symantec.com/connect/blogs/linuxpsybot-your-router-secure

Paul, I. (2009). Nasty New Worm Targets Home Routers, Cable Modems. Retrieved April 20, 2010, from http://www.pcworld.com/article/161941 /nasty_new_worm_targets_home_routers_cable_modems.html?tk=rss_main

Perelman, L. C., Paradis, J., & Barret, E. (1998). The Mayfield Handbook of Technical & Scientific Writing. Mountain View, CA: Mayfield Publishing Company.

Phippen, A., & Furnell, S. (2007). Taking responsibility for online protection - why citizens have their part to play. Computer Fraud & Security, 2007(11), 8- 13.

Purvis, C. (2012). The Pineapple Express: Hak5 Builds A Bigger, Better WiFi Honey Pot. Retrieved January 28, 2012, from http://securitymanagement.com/news/pineapple-express-hak5-builds-a-biggerbetter-wifi-honey-pot-009470

Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308.

ScanSafe. (2009). ScanSafe Annual Global Threat Report 2008. Retrieved December 11, 2010, from http://www.scansafe.com/downloads/gtr/2008_AGTR.pdf

Seymour, B. (2010). Drive-by-hackers. Retrieved May 10, 2011, from http://au.todaytonight.yahoo.com/article/7907101/consumer/drive-hackers

Simpsons, D. (2012). WiFi Pineapple. Retrieved January 27, 2012, from http://hakshop.myshopify.com/collections/frontpage/products/wifi-pineapple

StaySmartOnline. (2010). Stay Smart Online - About. Retrieved October 12, 2010, from http://www.staysmartonline.gov.au/about

Symantec. (2009). Linux.Psybot—Is Your Router Secure? Retrieved March 2, 2010, from http://www.symantec.com/connect/blogs/linuxpsybot-your-routersecure

Szewczyk, P. (2006). Individuals Perceptions of Wireless Security in the Home Environment. Paper presented at the 4th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia

Szewczyk, P. (2010). Security Information Supplied by Australian Internet Service Providers. Paper presented at the 8th Australian Information Security Management Conference, Duxton Hotel, Perth, Western Australia.

Szewczyk, P. (2011). Usability of Internet Security Software: Have They Got it Right? Paper presented at the 5th International Conference on Network and System Secirty, Milan, Italy.

Szewczyk, P., & Furnell, S. (2009). Assessing the online security awareness of Australian Internet users. Paper presented at the 8th Annual Security Conference, Las Vegas, NV.

Szewczyk, P., & Valli, C. (2009). Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16.

Tan, G. W., & Wei, K. K. (2006). An empirical study of Web browsing behavior: Towards an effective Website design. Electronic Commerce Research and Applications, 5(4), 261-271.

Whitten, A., & Tygar, J. D. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Paper presented at the 8th USENIX Security Symposium, Washington, D.C.

Wieringa, D., Moore, C., & Barnes, V. (1993). Procedure Writing. Piscataway, NJ: IEEE Press.




To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.