“Beautiful Security” is a paradigm that requires security ceremonies to contribute to the ‘beauty’ of a user experience. The underlying assumption is that people are likely to be willing to engage with more beautiful security ceremonies. It is hoped that such ceremonies will minimise human deviations from the prescribed interaction, and that security will be improved as a consequence. In this paper, we explain how we went about deriving beautification principles, and how we tested the efficacy of these by applying them to specific security ceremonies. As a first step, we deployed a crowd-sourced platform, using both explicit and metaphorical questions, to extract general aspects associated with the perception of the beauty of real-world sec...
This paper describes the unique challenges facing usable security research and design, and introduce...
Background: Human beings are an integral part of computer security, whether we actively participate...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
When we use secure computer systems, we engage with carefully orchestrated and ordered interactions ...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
A security ceremony expands a security protocol with everything that is considered out of band for i...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
Part 7: Social Networks and Social EngineeringInternational audienceA security ceremony expands a se...
Purpose – This paper aims to present an approach where assumption personas are used to engage s...
Some security devices can be ugly, inconvenient or an infringement on civil liberties. This means th...
In traditional interactions that do not rely on technology, most people are able to assess risks to ...
Authentication ceremonies detect and mitigate Man-in-the-Middle (MitM) attacks on end-to-end encrypt...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
This paper describes the unique challenges facing usable security research and design, and introduce...
Background: Human beings are an integral part of computer security, whether we actively participate...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
When we use secure computer systems, we engage with carefully orchestrated and ordered interactions ...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
A security ceremony expands a security protocol with everything that is considered out of band for i...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
Part 7: Social Networks and Social EngineeringInternational audienceA security ceremony expands a se...
Purpose – This paper aims to present an approach where assumption personas are used to engage s...
Some security devices can be ugly, inconvenient or an infringement on civil liberties. This means th...
In traditional interactions that do not rely on technology, most people are able to assess risks to ...
Authentication ceremonies detect and mitigate Man-in-the-Middle (MitM) attacks on end-to-end encrypt...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
To date, system research has focused on designing security mechanisms to protect systems access alth...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
This paper describes the unique challenges facing usable security research and design, and introduce...
Background: Human beings are an integral part of computer security, whether we actively participate...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...