skip to main content
10.1145/1753846.1754114acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Investigating user account control practices

Authors Info & Claims
Published:10 April 2010Publication History

ABSTRACT

Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows Vista supports usage of lower privilege accounts; a UAC prompt allows users to raise their privileges when required. We conducted a user study and contextual interviews to understand the motives and challenges participants face when using different user accounts and the UAC approach. Most participants were not aware of or motivated to employ low-privileged accounts. Moreover, most did not understand or carefully consider the prompts.

References

  1. Cranor, F. L. A framework for reasoning about the human in the loop. In UPSEC '08 (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Poole, W. Financial Analyst Meeting, Senior Vice President, Windows Client, July 2005. http://www.microsoft.com/msft/speech/FY05/PooleFAM2005.mspx.Google ScholarGoogle Scholar
  3. Russinovich, M. Inside Windows 7 User Account Control, TechNet Magazine, 2009.Google ScholarGoogle Scholar
  4. Saltzer, J. and Schroeder, M. The protection of information in computer systems. Proc. of the IEEE, 63(9), 1278--1308, Sept. 1975.Google ScholarGoogle ScholarCross RefCross Ref
  5. Steven A., Applying the Principle of Least Privilege to User Accounts on Windows XP, Microsoft TechNet Library, January 18, 2006.Google ScholarGoogle Scholar
  6. Some guidelines for securing your windows vista pc, 2007. http://download.microsoft.com/download/0/ e/9/0e922c03-8537-482f-b57c-aa385b3dee20/Security _Best_Practice_Guidance_for_Consumers.docGoogle ScholarGoogle Scholar
  7. Understanding and Configuring User Account Control in Windows Vista http://technet.microsoft.com/en-us/library/cc709628(WS.10).aspxGoogle ScholarGoogle Scholar
  8. Wu, M., Miller, R., and Garfinkel, S. Do Security Toolbars Actually Prevent Phishing Attacks? Proc. of CHI 2006, 601--610, April 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Investigating user account control practices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader