Security and Usability: Analysis and Evaluation.

The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec...

詳細記述

書誌詳細
主要な著者: Kainda, R, Flechais, I, Roscoe, A
フォーマット: Journal article
言語:English
出版事項: IEEE 2010
_version_ 1826288491369070592
author Kainda, R
Flechais, I
Roscoe, A
author_facet Kainda, R
Flechais, I
Roscoe, A
author_sort Kainda, R
collection OXFORD
description The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these. © 2010 IEEE.
first_indexed 2024-03-07T02:14:31Z
format Journal article
id oxford-uuid:a1c5115e-d574-428c-aa9a-e44e5d4883d3
institution University of Oxford
language English
last_indexed 2024-03-07T02:14:31Z
publishDate 2010
publisher IEEE
record_format dspace
spelling oxford-uuid:a1c5115e-d574-428c-aa9a-e44e5d4883d32022-03-27T02:15:29ZSecurity and Usability: Analysis and Evaluation.Journal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:a1c5115e-d574-428c-aa9a-e44e5d4883d3EnglishSymplectic Elements at OxfordIEEE2010Kainda, RFlechais, IRoscoe, AThe differences between the fields of Human Computer Interaction and Security (HCISec) and Human Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these. © 2010 IEEE.
spellingShingle Kainda, R
Flechais, I
Roscoe, A
Security and Usability: Analysis and Evaluation.
title Security and Usability: Analysis and Evaluation.
title_full Security and Usability: Analysis and Evaluation.
title_fullStr Security and Usability: Analysis and Evaluation.
title_full_unstemmed Security and Usability: Analysis and Evaluation.
title_short Security and Usability: Analysis and Evaluation.
title_sort security and usability analysis and evaluation
work_keys_str_mv AT kaindar securityandusabilityanalysisandevaluation
AT flechaisi securityandusabilityanalysisandevaluation
AT roscoea securityandusabilityanalysisandevaluation