Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.
References
ABS. (2012). Type of Access Connection. Retrieved January 12, 2012, from http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/8153.0Chapter3Dec%20201 1
Ajzen, M. F. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs, N.J: Prentice-Hall.
Andersson, K., & Szewczyk, P. (2011). Insecurity by Obscrutiy Continues: Are ADSL router manuals putting end-users at risk. Paper presented at the 9th Australian Information Security Management Conference.
BackTrack. (2012). BackTrack Linux - Penetration Testing Distribution. Retrieved March 5, 2012, from http://www.backtrack-linux.org/
Berson, J. (2005). ZoneAlarm: Creating Usable Security Products for Consumers. In L. F. Cranor & S. Garfinkel (Eds.), Security and Usability: Designing Security Systems That People Can Use. North Sebastopol, CA: O'Reilly Media.
Brand, M., Valli, C., & Woodward, A. (2010). Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42.
Čeleda, P., Krejčí, R., Vykopal, J., & Drašar, M. (2010). Embedded Malware - An Analysis of the Chuck Norris Botnet Paper presented at the 2010 European Conference on Computer Network Defense (EC2ND), Technische Universität Berlin, Germany.
Cook, D., Szewczyk, P., & Sansurooah, K. (2011). Seniors Language Paradigms: 21st century jargon and the impact on computer security and financial transactions for senior citizens. Paper presented at the 9th Australian Information Security and Management Conference, Citigate Hotel, Perth, Western Australia.
Cyveillance. (2010). Malware Detection Rates for Leading Malware Solutions. Retrieved April 5, 2011, from http://www.cyveillance.com/web/docs /WP_MalwareDetectionRates.pdf
DBCDE. (2011). What is the NBN? Retrieved October 20, 2011, from http://www.nbn.gov.au/about-the-nbn/what-is-the-nbn/
Eagly, A. H., & Chaiken, S. (1993). The Psychology of Attitudes. Orlando, FL: Harcourt Brace Jovanovich.
Get Safe Online. (2012). Get Safe Online. Retrieved January 14, 2012, from http://www.getsafeonline.org/
Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education.
Hutchinson, N. (2012, February 14). Free WiFi on horizon. Guardian Express, p. 1.
Jacobsson, S. (2012). Facebook Timeline Privacy Tips: Locak Down Your Profile. Retrieved January 21, 2012, from http://www.pcworld.com/article/249019 /facebook_timeline_privacy_tips_lock_down_your_profile.html
Nahorney, B. (2009). Linux.Psybot—Is Your Router Secure? Retrieved November 21, 2011, from http://www.symantec.com/connect/blogs/linuxpsybot-your-router-secure
Paul, I. (2009). Nasty New Worm Targets Home Routers, Cable Modems. Retrieved April 20, 2010, from http://www.pcworld.com/article/161941 /nasty_new_worm_targets_home_routers_cable_modems.html?tk=rss_main
Perelman, L. C., Paradis, J., & Barret, E. (1998). The Mayfield Handbook of Technical & Scientific Writing. Mountain View, CA: Mayfield Publishing Company.
Phippen, A., & Furnell, S. (2007). Taking responsibility for online protection - why citizens have their part to play. Computer Fraud & Security, 2007(11), 8- 13.
Purvis, C. (2012). The Pineapple Express: Hak5 Builds A Bigger, Better WiFi Honey Pot. Retrieved January 28, 2012, from http://securitymanagement.com/news/pineapple-express-hak5-builds-a-biggerbetter-wifi-honey-pot-009470
Saltzer, J. H., & Schroeder, M. D. (1975). The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9), 1278-1308.
ScanSafe. (2009). ScanSafe Annual Global Threat Report 2008. Retrieved December 11, 2010, from http://www.scansafe.com/downloads/gtr/2008_AGTR.pdf
Seymour, B. (2010). Drive-by-hackers. Retrieved May 10, 2011, from http://au.todaytonight.yahoo.com/article/7907101/consumer/drive-hackers
Simpsons, D. (2012). WiFi Pineapple. Retrieved January 27, 2012, from http://hakshop.myshopify.com/collections/frontpage/products/wifi-pineapple
StaySmartOnline. (2010). Stay Smart Online - About. Retrieved October 12, 2010, from http://www.staysmartonline.gov.au/about
Symantec. (2009). Linux.Psybot—Is Your Router Secure? Retrieved March 2, 2010, from http://www.symantec.com/connect/blogs/linuxpsybot-your-routersecure
Szewczyk, P. (2006). Individuals Perceptions of Wireless Security in the Home Environment. Paper presented at the 4th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia
Szewczyk, P. (2010). Security Information Supplied by Australian Internet Service Providers. Paper presented at the 8th Australian Information Security Management Conference, Duxton Hotel, Perth, Western Australia.
Szewczyk, P. (2011). Usability of Internet Security Software: Have They Got it Right? Paper presented at the 5th International Conference on Network and System Secirty, Milan, Italy.
Szewczyk, P., & Furnell, S. (2009). Assessing the online security awareness of Australian Internet users. Paper presented at the 8th Annual Security Conference, Las Vegas, NV.
Szewczyk, P., & Valli, C. (2009). Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16.
Tan, G. W., & Wei, K. K. (2006). An empirical study of Web browsing behavior: Towards an effective Website design. Electronic Commerce Research and Applications, 5(4), 261-271.
Whitten, A., & Tygar, J. D. (1999). Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Paper presented at the 8th USENIX Security Symposium, Washington, D.C.
Wieringa, D., Moore, C., & Barnes, V. (1993). Procedure Writing. Piscataway, NJ: IEEE Press.
Recommended Citation
Szewczyk, Patryk
(2012)
"An Australian Perspective on the Challenges for Computer and Network Security for Novice Endusers,"
Journal of Digital Forensics, Security and Law: Vol. 7
, Article 3.
DOI: https://doi.org/10.15394/jdfsl.2012.1133
Available at:
https://commons.erau.edu/jdfsl/vol7/iss4/3
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons