Security and Usability: Analysis and Evaluation.
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec...
主要な著者: | , , |
---|---|
フォーマット: | Journal article |
言語: | English |
出版事項: |
IEEE
2010
|
_version_ | 1826288491369070592 |
---|---|
author | Kainda, R Flechais, I Roscoe, A |
author_facet | Kainda, R Flechais, I Roscoe, A |
author_sort | Kainda, R |
collection | OXFORD |
description | The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these. © 2010 IEEE. |
first_indexed | 2024-03-07T02:14:31Z |
format | Journal article |
id | oxford-uuid:a1c5115e-d574-428c-aa9a-e44e5d4883d3 |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T02:14:31Z |
publishDate | 2010 |
publisher | IEEE |
record_format | dspace |
spelling | oxford-uuid:a1c5115e-d574-428c-aa9a-e44e5d4883d32022-03-27T02:15:29ZSecurity and Usability: Analysis and Evaluation.Journal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:a1c5115e-d574-428c-aa9a-e44e5d4883d3EnglishSymplectic Elements at OxfordIEEE2010Kainda, RFlechais, IRoscoe, AThe differences between the fields of Human Computer Interaction and Security (HCISec) and Human Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these. © 2010 IEEE. |
spellingShingle | Kainda, R Flechais, I Roscoe, A Security and Usability: Analysis and Evaluation. |
title | Security and Usability: Analysis and Evaluation. |
title_full | Security and Usability: Analysis and Evaluation. |
title_fullStr | Security and Usability: Analysis and Evaluation. |
title_full_unstemmed | Security and Usability: Analysis and Evaluation. |
title_short | Security and Usability: Analysis and Evaluation. |
title_sort | security and usability analysis and evaluation |
work_keys_str_mv | AT kaindar securityandusabilityanalysisandevaluation AT flechaisi securityandusabilityanalysisandevaluation AT roscoea securityandusabilityanalysisandevaluation |