It is often suggested in the literature that employees regard technical security measures (TSMs) as user-unfriendly, indicating a trade-off between security and usability. However, there is little empirical evidence of such a trade-off, nor about the strength of the associated negative correlation and the importance employees attach to both properties. This paper intends to fill these knowledge gaps by studying employees’ trade-offs concerning the usability and security of TSMs within a discrete choice experiment (DCE) framework. In our DCE, employees are asked to indicate the most preferred security packages that describe combinations of TSMs. In addition, security and usability perceptions of the security packages are explicitly measured ...
In this study, we consider the question of adoption of information security technologies at individu...
Information security embodies the complex interaction between security policies, user perceptions of...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
Companies implement technical security measures to let their employees behave in a secure manner. Em...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
\u3cp\u3eAn unsolved debate in the field of usable security concerns whether security mechanisms sho...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Companies are increasing their investment in technologies to enable better access to information and...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
The human is frequently referred to as the weakest link of security. Employees who engage in behavio...
Stakeholders' security decisions play a fundamental role in determining security requirem...
Stakeholders' security decisions play a fundamental role in determining security requirements, yet, ...
Part 4: End-User SecurityInternational audienceThe importance of the human aspects of cybersecurity ...
In this study, we consider the question of adoption of information security technologies at individu...
Information security embodies the complex interaction between security policies, user perceptions of...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
Companies implement technical security measures to let their employees behave in a secure manner. Em...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
\u3cp\u3eAn unsolved debate in the field of usable security concerns whether security mechanisms sho...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Companies are increasing their investment in technologies to enable better access to information and...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
The human is frequently referred to as the weakest link of security. Employees who engage in behavio...
Stakeholders' security decisions play a fundamental role in determining security requirem...
Stakeholders' security decisions play a fundamental role in determining security requirements, yet, ...
Part 4: End-User SecurityInternational audienceThe importance of the human aspects of cybersecurity ...
In this study, we consider the question of adoption of information security technologies at individu...
Information security embodies the complex interaction between security policies, user perceptions of...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...