This article describes the unique challenges facing usable security research and design, and introduces three proposals for addressing these. For all intents and purposes, security design is currently a craft, where quality is dependent on individuals and their ability, rather than on principles and engineering. However, the wide variety of different skills necessary to design secure and usable systems is unlikely to be mastered by many individuals, requiring an unlikely combination of insight and education. Psychology, economics and cryptography have very little in common, and yet all have a role to play in the field of usable security. To address these concerns, three proposals are presented here: 1) to adopt a principled design framework...
Item does not contain fulltextIn this contribution, we cover the major philosophical concepts descri...
Despite a growing interest in the design and engineering of interactive secure systems, there is al...
YesPasswords are the most popular and constitute the first line of defence in computer-based securi...
This article describes the unique challenges facing usable security research and design, and introdu...
This paper describes the unique challenges facing usable security research and design, and introduce...
Security experts frequently refer to people as “the weakest link in the chain” of system security. ...
The need for secure systems and improved authentication methods is growing as online transactions an...
Background: Human beings are an integral part of computer security, whether we actively participate...
When designing secure systems, we are inundated with an eclectic mix of security and non-security re...
Usable security assumes that when security functions are more usable, people are more likely to use ...
Traditionally, security is only considered as strong as its weakest link, and people were considered...
Learning objectives: * understand the principles of engineering secure systems. * make effective us...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
Item does not contain fulltextIn this contribution, we cover the major philosophical concepts descri...
Despite a growing interest in the design and engineering of interactive secure systems, there is al...
YesPasswords are the most popular and constitute the first line of defence in computer-based securi...
This article describes the unique challenges facing usable security research and design, and introdu...
This paper describes the unique challenges facing usable security research and design, and introduce...
Security experts frequently refer to people as “the weakest link in the chain” of system security. ...
The need for secure systems and improved authentication methods is growing as online transactions an...
Background: Human beings are an integral part of computer security, whether we actively participate...
When designing secure systems, we are inundated with an eclectic mix of security and non-security re...
Usable security assumes that when security functions are more usable, people are more likely to use ...
Traditionally, security is only considered as strong as its weakest link, and people were considered...
Learning objectives: * understand the principles of engineering secure systems. * make effective us...
When considering the security of a system, the analyst must simultaneously work with two types of pr...
Despite the acknowledged need for systems to be both us- able and secure, we lack guidance on how d...
Despite the acknowledged need for systems to be both usable and secure, we lack guidance on how deve...
Item does not contain fulltextIn this contribution, we cover the major philosophical concepts descri...
Despite a growing interest in the design and engineering of interactive secure systems, there is al...
YesPasswords are the most popular and constitute the first line of defence in computer-based securi...