The security of any computer system that is configured and operated by human beings critically depends on the information conveyed by the user interface, the decisions of the computer users, and the interpretation of their actions. We establish some starting points for reasoning about security from a user-centred point of view, by modelling a system in terms of actors and actions and introducing the concept of the subjective actor-ability state. We identify ten key principles for user interaction design in secure systems and give case studies to illustrate and justify each principle, describing real-world problems and possible solutions. We anticipate that this work will help guide the design and evaluation of secure systems. 1
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Many system security departments treat users as a security risk to be controlled. The general conse...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
The security of any computer system that is configured and operated by human beings critically depen...
The security of any computer system that is configured\ud and operated by human beings critically de...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
“People are the weakest link in the security chain ” – Bruce Schneier The aim of the thesis is to i...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
ABSTRACT Security subsystems are often designed with flawed assumptions arising from system designer...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
Historically, computer security has its roots in the military domain with its hierarchical structure...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
Security subsystems are often designed with flawed assump-tions arising from system designers ’ faul...
Faced with an increasing range of attacks, the appropriate use of available security features in com...
Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Many system security departments treat users as a security risk to be controlled. The general conse...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
The security of any computer system that is configured and operated by human beings critically depen...
The security of any computer system that is configured\ud and operated by human beings critically de...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
“People are the weakest link in the security chain ” – Bruce Schneier The aim of the thesis is to i...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
ABSTRACT Security subsystems are often designed with flawed assumptions arising from system designer...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
Historically, computer security has its roots in the military domain with its hierarchical structure...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
Security subsystems are often designed with flawed assump-tions arising from system designers ’ faul...
Faced with an increasing range of attacks, the appropriate use of available security features in com...
Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
Many system security departments treat users as a security risk to be controlled. The general conse...
Security and usability are highly important and interdependent quality attributes of modern IT syste...