Security and Usability: Analysis and Evaluation
The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec...
Main Authors: | , , |
---|---|
格式: | Conference item |
出版: |
2010
|
_version_ | 1826298565828280320 |
---|---|
author | Kainda, R Flechais, I Roscoe, A |
author_facet | Kainda, R Flechais, I Roscoe, A |
author_sort | Kainda, R |
collection | OXFORD |
description | The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these. |
first_indexed | 2024-03-07T04:48:49Z |
format | Conference item |
id | oxford-uuid:d43fee81-0ce1-455a-85b2-096bb97ea4bc |
institution | University of Oxford |
last_indexed | 2024-03-07T04:48:49Z |
publishDate | 2010 |
record_format | dspace |
spelling | oxford-uuid:d43fee81-0ce1-455a-85b2-096bb97ea4bc2022-03-27T08:17:01ZSecurity and Usability: Analysis and EvaluationConference itemhttp://purl.org/coar/resource_type/c_5794uuid:d43fee81-0ce1-455a-85b2-096bb97ea4bcDepartment of Computer Science2010Kainda, RFlechais, IRoscoe, AThe differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially weakening its security. That is to say that the techniques prevalent in HCI are aimed at improving users' effectiveness, efficiency or satisfaction, but they do not take into account the potential threats and vulnerabilities that they can introduce. To address this problem, we propose a security and usability threat model detailing the different factors that are pertinent to the security and usability of secure systems, together with a process for assessing these. |
spellingShingle | Kainda, R Flechais, I Roscoe, A Security and Usability: Analysis and Evaluation |
title | Security and Usability: Analysis and Evaluation |
title_full | Security and Usability: Analysis and Evaluation |
title_fullStr | Security and Usability: Analysis and Evaluation |
title_full_unstemmed | Security and Usability: Analysis and Evaluation |
title_short | Security and Usability: Analysis and Evaluation |
title_sort | security and usability analysis and evaluation |
work_keys_str_mv | AT kaindar securityandusabilityanalysisandevaluation AT flechaisi securityandusabilityanalysisandevaluation AT roscoea securityandusabilityanalysisandevaluation |