The usability/security trade-off indicates the inversely proportional relationship that seems to exist between usability and security. The more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. So far, attempts to reduce the gap between usability and security have been unsuccessful. In this paper, we offer a theoretical perspective to exploit this tradeoff rather than fight it, as well as a practical approach to the use of contextual improvements in system usability to reward secure behavior. The theoretical perspective, based on the concept of reinforcement, has been successfully applied to several domains, and there is no reason to believe that the cybersecurity domain will represe...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
beki @ parc.com Recent results from usability studies of security systems have shown that end-users ...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
While usability testing is well established, assessing the usability of security software, tools, or...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
Defense techniques detect or prevent attacks based on their ability to model the attacks. A balance ...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
The increased availability of information and services has led to the affirmation of the Internet in...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Deciding between security and usability of systems remains an important topic among managers and aca...
Usability is the weakest link in the security chain of many prominent applications. A set of securit...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...
beki @ parc.com Recent results from usability studies of security systems have shown that end-users ...
The usability of the end-user security software and systems is oftenneglected. We argue that the mai...
While usability testing is well established, assessing the usability of security software, tools, or...
Security and usability are highly important and interdependent quality attributes of modern IT syste...
Part 9: Usable SecurityInternational audienceSecurity and usability of systems continues to be an im...
Defense techniques detect or prevent attacks based on their ability to model the attacks. A balance ...
Abstract. Computer security has traditionally been assessed from a technical point of view. Another ...
The increased availability of information and services has led to the affirmation of the Internet in...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
Resonating with the theme “Blue Ocean Research”, this research explores the usability of information...
Deciding between security and usability of systems remains an important topic among managers and aca...
Usability is the weakest link in the security chain of many prominent applications. A set of securit...
Security policy authors face a dilemma. On one hand, policies need to respond to a constantly evolvi...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
The differences between the fields of Human Computer Interaction and Security (HCISec) and Human Com...