An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or black-boxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on User Experience (UX) in the context of e-voting. Two versions of an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed security mechanisms, while version ND did not reveal any security-related information. We collected data on UX using stan-dardised evaluation scales and semi-structured interviews. Version D performed better overall in terms of UX ...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
In the increasing face of threats in computing world end users often come across with security featu...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
peer reviewedThis paper presents a mobile application for vote-casting and vote-verification based ...
Abstract In this paper a pilot e-voting system is being studied to gain insight into the complexity ...
An ongoing discussion in the field of usable privacy and security debates whether security mechanism...
The data generated by interconnected technologies has to be protected. Passwords are used to protect...
Part 7: Usable SecurityInternational audienceMillions of users all over the world nowadays spend man...
This paper presents a mobile application for vote-casting and vote-verification based on the Selene ...
While usability testing is well established, assessing the usability of security software, tools, or...
[[abstract]]The relationship between computers and human are closer due to the rapid technology deve...
While the domain of security dependent technologies brings new challenges to HCI research it seems t...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
In the increasing face of threats in computing world end users often come across with security featu...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
An unsolved debate in the field of usable security concerns whether security mechanisms should be vi...
peer reviewedThis paper presents a mobile application for vote-casting and vote-verification based ...
Abstract In this paper a pilot e-voting system is being studied to gain insight into the complexity ...
An ongoing discussion in the field of usable privacy and security debates whether security mechanism...
The data generated by interconnected technologies has to be protected. Passwords are used to protect...
Part 7: Usable SecurityInternational audienceMillions of users all over the world nowadays spend man...
This paper presents a mobile application for vote-casting and vote-verification based on the Selene ...
While usability testing is well established, assessing the usability of security software, tools, or...
[[abstract]]The relationship between computers and human are closer due to the rapid technology deve...
While the domain of security dependent technologies brings new challenges to HCI research it seems t...
Purpose For decades, literature has reported on the perceived conflict between usability and securit...
Abstract—Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most o...
Human factors are perhaps the greatest current barrier to effective computer security. Most security...
In the increasing face of threats in computing world end users often come across with security featu...