Guidelines for usable cybersecurity: past and present

Usability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by the need for confidentiality, integrity, availability and other concerns, security features have become standard components of the digital environment which pervade our li...

Descripció completa

Dades bibliogràfiques
Autors principals: Nurse, J, Creese, S, Goldsmith, M, Lamberts, K
Format: Conference item
Publicat: IEEE 2011
_version_ 1826260252566224896
author Nurse, J
Creese, S
Goldsmith, M
Lamberts, K
author_facet Nurse, J
Creese, S
Goldsmith, M
Lamberts, K
author_sort Nurse, J
collection OXFORD
description Usability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by the need for confidentiality, integrity, availability and other concerns, security features have become standard components of the digital environment which pervade our lives requiring use by novices and experts alike. As security features are exposed to wider cross-sections of the society, it is imperative that these functions are highly usable. This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. With this goal of highly usable security in mind, there have been a plethora of studies in the literature focused on identifying security usability problems and proposing guidelines and recommendations to address them. Our paper aims to contribute to the field by consolidating a number of existing design guidelines and defining an initial core list for future reference. Whilst investigating this topic, we take the opportunity to provide an up-to-date review of pertinent cybersecurity usability issues and evaluation techniques applied to date. We expect this research paper to be of use to researchers and practitioners with interest in cybersecurity systems which appreciate the human and social elements of design.
first_indexed 2024-03-06T19:02:43Z
format Conference item
id oxford-uuid:14191d20-dd84-4d11-bad7-d2cc69e2d3f9
institution University of Oxford
last_indexed 2024-03-06T19:02:43Z
publishDate 2011
publisher IEEE
record_format dspace
spelling oxford-uuid:14191d20-dd84-4d11-bad7-d2cc69e2d3f92022-03-26T10:17:41ZGuidelines for usable cybersecurity: past and presentConference itemhttp://purl.org/coar/resource_type/c_5794uuid:14191d20-dd84-4d11-bad7-d2cc69e2d3f9Department of Computer ScienceIEEE2011Nurse, JCreese, SGoldsmith, MLamberts, KUsability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by the need for confidentiality, integrity, availability and other concerns, security features have become standard components of the digital environment which pervade our lives requiring use by novices and experts alike. As security features are exposed to wider cross-sections of the society, it is imperative that these functions are highly usable. This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. With this goal of highly usable security in mind, there have been a plethora of studies in the literature focused on identifying security usability problems and proposing guidelines and recommendations to address them. Our paper aims to contribute to the field by consolidating a number of existing design guidelines and defining an initial core list for future reference. Whilst investigating this topic, we take the opportunity to provide an up-to-date review of pertinent cybersecurity usability issues and evaluation techniques applied to date. We expect this research paper to be of use to researchers and practitioners with interest in cybersecurity systems which appreciate the human and social elements of design.
spellingShingle Nurse, J
Creese, S
Goldsmith, M
Lamberts, K
Guidelines for usable cybersecurity: past and present
title Guidelines for usable cybersecurity: past and present
title_full Guidelines for usable cybersecurity: past and present
title_fullStr Guidelines for usable cybersecurity: past and present
title_full_unstemmed Guidelines for usable cybersecurity: past and present
title_short Guidelines for usable cybersecurity: past and present
title_sort guidelines for usable cybersecurity past and present
work_keys_str_mv AT nursej guidelinesforusablecybersecuritypastandpresent
AT creeses guidelinesforusablecybersecuritypastandpresent
AT goldsmithm guidelinesforusablecybersecuritypastandpresent
AT lambertsk guidelinesforusablecybersecuritypastandpresent