Welcome to SecureUser

Hello! Welcome to SecureUser, a blog about the trials and tribulations of fixing the weakest link within information and computer systems. In short, this blog is about users, user security, and what can be done to address the problem.

My name is Christopher Seedyk. I am the editor and predominant contributor to the SecureUser blog. I am currently a second year doctoral student at Colorado Technical University in the Computer Science Program. My research interests are in human-computer psychology, human-computer interaction, and information assurance. I have a BS in Computer Information Systems from Columbia College and a MS in Computer Information Systems from Boston University. Additionally, I hold several industry certifications, including the GCIH, Security+, MCSA, CCDP, and CCNP. I have been working, studying, and researching the computer science field for the past 8 years.

SecureUser was created for my CS875 class, Futuring and Inovation. The goal of the class is to develop the skills in futuring through a variety of techniques and introduce formal methods of innovation and diffusion of innovation (Colorado Technical University, 2015). CS875 is essentially about understanding the process of innovating, what forces facilitate and hinder the innovation process, and how innovation can be successfully accomplished to continue growing a certain field. SecureUser seeks to be a central hub for scholars, practitioners, and users alike to learn about the latest trends in achieving secure user behavior and secure information systems. We will cover a variety of topics, such as the use of behavior modification techniques (namely Protection Motivation Theory) to modify and encourage secure user behavior using fear appeals (Infinedo, 2012), the shift from password to passphrases to encourage users to embrace more secure and effective authentication systems (Bonk, 2014), and review literature and techniques on a variety of topics related to user security. The goal is for SecureUser to become an exchange point between scholars, practitioners, and the users they are trying to secure, to achieve the goal of human-computer interaction: a user experience which is “satisfying, effective, efficient, and useful” (Errirty, 2016).

References

Bonk, C. L. (2014). StoryPass: A System & Study for Memorable Secure Passphrases (Doctoral dissertation, University of Ontario Institute of Technology).

Colorado Technical University. (2015). CS875 Futuring and Innovation. Retrieved April 15, 2016 from http://coloradotech.smartcatalogiq.com/2015/Catalog/Courses/CS-Computer-Science/800/CS-875.

Errity, A. (2016). Human–Computer Interaction. An Introduction to Cyberpsychology, 241.

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security31(1), 83-95.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s