Security and Usability: Analysis and Evaluation

The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec...

全面介紹

書目詳細資料
Main Authors: Kainda, R, Flechais, I, Roscoe, A
格式: Conference item
出版: 2010
_version_ 1826298565828280320
author Kainda, R
Flechais, I
Roscoe, A
author_facet Kainda, R
Flechais, I
Roscoe, A
author_sort Kainda, R
collection OXFORD
description The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these.
first_indexed 2024-03-07T04:48:49Z
format Conference item
id oxford-uuid:d43fee81-0ce1-455a-85b2-096bb97ea4bc
institution University of Oxford
last_indexed 2024-03-07T04:48:49Z
publishDate 2010
record_format dspace
spelling oxford-uuid:d43fee81-0ce1-455a-85b2-096bb97ea4bc2022-03-27T08:17:01ZSecurity and Usability: Analysis and EvaluationConference itemhttp://purl.org/coar/resource_type/c_5794uuid:d43fee81-0ce1-455a-85b2-096bb97ea4bcDepartment of Computer Science2010Kainda, RFlechais, IRoscoe, AThe differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these.
spellingShingle Kainda, R
Flechais, I
Roscoe, A
Security and Usability: Analysis and Evaluation
title Security and Usability: Analysis and Evaluation
title_full Security and Usability: Analysis and Evaluation
title_fullStr Security and Usability: Analysis and Evaluation
title_full_unstemmed Security and Usability: Analysis and Evaluation
title_short Security and Usability: Analysis and Evaluation
title_sort security and usability analysis and evaluation
work_keys_str_mv AT kaindar securityandusabilityanalysisandevaluation
AT flechaisi securityandusabilityanalysisandevaluation
AT roscoea securityandusabilityanalysisandevaluation