Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolving, well reported threat landscape, the consequences of which have heightened the security awareness of senior managers. On the other hand, the impact of policies extend beyond constraints on desktop computers and laptops; an overly constrained policy may compromise operations or stifle the freedom needed for staff to innovate. Because few people are fired for making a policy too secure, as long as usability continues to be treated as a trade-off quality together with functionality then policies will err on the side of constraint over freedom of action. Existing work argues that balanced security can be achieved using Requirements Engineering...
Defining security requirements is the important first step in designing, implementing and evaluating...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
There is ongoing interest in utilising user expe- riences associated with security and priv...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
A balanced approach is needed for developing information security policies in Critical National Infr...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
Deciding between security and usability of systems remains an important topic among managers and aca...
A balanced approach is needed for developing information security policies in Critical National Infr...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Although widely used for both security and usability concerns, scenarios used in security design may...
Usable security assumes that when security functions are more usable, people are more likely to use ...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
Usability is the weakest link in the security chain of many prominent applications. A set of securit...
Defining security requirements is the important first step in designing, implementing and evaluating...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
There is ongoing interest in utilising user expe- riences associated with security and priv...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
A balanced approach is needed for developing information security policies in Critical National Infr...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
Deciding between security and usability of systems remains an important topic among managers and aca...
A balanced approach is needed for developing information security policies in Critical National Infr...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Although widely used for both security and usability concerns, scenarios used in security design may...
Usable security assumes that when security functions are more usable, people are more likely to use ...
abstract: We discuss processes involved in user-centric security design, including the synthesis of ...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
Usability is the weakest link in the security chain of many prominent applications. A set of securit...
Defining security requirements is the important first step in designing, implementing and evaluating...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
There is ongoing interest in utilising user expe- riences associated with security and priv...