Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding and using security mecha-nisms. Other security mechanisms are simply annoying for end users. As the overall security of any system is only as strong as the weakest link in this system, bad usability of IT security mechanisms may result in operating errors, resulting in inse-cure systems. Buying decisions of end users may be affected by the u...
Abstract—When users ’ mental models don’t match the way the underlying systems work, problems can ar...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
Usability is arguably one of the most significant social topics and issues within the field of cyber...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
One of the key challenges in the development of secure software is the tradeoff between usability an...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
beki @ parc.com Recent results from usability studies of security systems have shown that end-users ...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
This paper presents the results of a usability study focused on three end-to-end encryption technolo...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...
Almost all financial transactions and personal data is nowadays online. A world with easy access to ...
In this paper I present a study on “S/MIME”, which has become the industry standard for secure email...
Purpose – Email communication has been used for many years, and has begun to replace traditi...
Purpose – Email communication has been used for many years, and has begun to replace traditional, ph...
Abstract—When users ’ mental models don’t match the way the underlying systems work, problems can ar...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
Usability is arguably one of the most significant social topics and issues within the field of cyber...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
One of the key challenges in the development of secure software is the tradeoff between usability an...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
beki @ parc.com Recent results from usability studies of security systems have shown that end-users ...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
This paper presents the results of a usability study focused on three end-to-end encryption technolo...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...
Almost all financial transactions and personal data is nowadays online. A world with easy access to ...
In this paper I present a study on “S/MIME”, which has become the industry standard for secure email...
Purpose – Email communication has been used for many years, and has begun to replace traditi...
Purpose – Email communication has been used for many years, and has begun to replace traditional, ph...
Abstract—When users ’ mental models don’t match the way the underlying systems work, problems can ar...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
Usability is arguably one of the most significant social topics and issues within the field of cyber...