Deciding between security and usability of systems remains an important topic among managers and academics. One of the fundamental problems is to balance the conflicting requirements of security and usability. We argue that definition of objectives for security and usability allows for deciding about the right balance between security and usability. To this effect we propose two instruments for assessing security and usability of systems, and develop them in three phases. In Phase 1 we identified 16 clusters of means and 8 clusters of fundamental objectives using the value-focused thinking approach and interviews with 35 experts. Based on phase 1, in the second phase we collected a sample of 201 users to purify, and ensure reliability and u...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
There is ongoing interest in utilising user expe- riences associated with security and priv...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Companies implement technical security measures to let their employees behave in a secure manner. Em...
The aim of the thesis is to investigate the relationship between human behaviour and effective secur...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
Usability is the weakest link in the security chain of many prominent applications. A set of securit...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
The increased availability of information and services has led to the affirmation of the Internet in...
Part 4: End-User SecurityInternational audienceThe importance of the human aspects of cybersecurity ...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
There is ongoing interest in utilising user expe- riences associated with security and priv...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
The usability/security trade-off indicates the inversely proportional relationship that seems to exi...
Companies implement technical security measures to let their employees behave in a secure manner. Em...
The aim of the thesis is to investigate the relationship between human behaviour and effective secur...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
Usability is the weakest link in the security chain of many prominent applications. A set of securit...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
There is ongoing interest in utilising user experiences associated with security and privacy to bett...
The increased availability of information and services has led to the affirmation of the Internet in...
Part 4: End-User SecurityInternational audienceThe importance of the human aspects of cybersecurity ...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
There is ongoing interest in utilising user expe- riences associated with security and priv...