Abstract. We explore the use of extrinsic motivation to improve the state of user-centered security mechanisms. Specifically, we study applications of scores as user incentives in the context of secure device pairing. We develop a scoring functionality that can be integrated with traditional pairing approaches. We then report on a usability study that we performed to evaluate the effect of scoring on the performance of users in comparison operations. Our results demonstrate that individuals are likely to commit fewer errors and show more acceptance when working with the scoring based pairing approach. Framing pairing as a game and providing feedback to users in the form of a score is an efficient way to improve pairing security, particularl...
Part 4: Organisational AspectsInternational audienceInformation security emphasizes the importance o...
Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, the...
Despite decades of research into developing abstract security advice and improving interfaces, users...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Recent years have seen a proliferation of secure device pair-ing methods that try to improve both th...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Abstract—The secure “pairing ” of wireless devices based on out-of-band communication is an establis...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
Securely associating, or“pairing,”wireless devices via out-of-band communication channels is a well ...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The security of any computer system that is configured and operated by human beings critically depen...
Part 4: Organisational AspectsInternational audienceInformation security emphasizes the importance o...
Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, the...
Despite decades of research into developing abstract security advice and improving interfaces, users...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Recent years have seen a proliferation of secure device pair-ing methods that try to improve both th...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Abstract—The secure “pairing ” of wireless devices based on out-of-band communication is an establis...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
Securely associating, or“pairing,”wireless devices via out-of-band communication channels is a well ...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Abstract. Setting up security associations between end-user devices is a challenging task when it ne...
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifica...
The security of any computer system that is configured and operated by human beings critically depen...
Part 4: Organisational AspectsInternational audienceInformation security emphasizes the importance o...
Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, the...
Despite decades of research into developing abstract security advice and improving interfaces, users...