ABSTRACT
Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to understand participants' knowledge, requirements, expectations, and misconceptions for personal firewalls. Analysis of 10 interviews shows that different design decisions (i.e., level of automation, multiple profile settings) are appropriate for users with different levels of security knowledge and experience.
- Dourish, P., Grinter, R.E., de la Flor, J.D., & Joseph, M. Security in the wild: user strategies for managing security as an everyday problem. Personal and Ubiquitous Computing, 8 (2004), 391--401. Google ScholarCross Ref
- Downs, J. S., Holbrook, M. B., & Cranor, L. F. Decision strategies and susceptibility to phishing. In SOUPS '06, vol. 149 (2006), 79--90. Google ScholarDigital Library
- Edwards, W. K., Poole, E. S., & Stoll, J. Security automation considered harmful? In NSPW '07 (2007), 33--42. Google ScholarDigital Library
- Egelman, S., Cranor, L. F., & Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08 (2008), 1065--1074. Google ScholarDigital Library
- Hazari, S. Perceptions of end-users on the requirements in personal firewall software: an exploratory study. The Journal of Supercomputing, 17--3 (2005), 47--56.Google Scholar
- Herzog A. & Shahmehri N. Usability and security of personal firewalls. New Approaches for Security, Privacy in Complex Environments (2007), 37--48.Google Scholar
- Johnston, J., Eloff, J.H.P. & Labuschagneb, L. Security and human computer interfaces. Computers and Security, 22 (2003), 675--684.Google ScholarDigital Library
- Raja, F., Hawkey, K. & Beznosov, K. Revealing hidden context: improving mental models of personal firewall users. In SOUPS '09 (2009), 1--12. Google ScholarDigital Library
- Sandelowski, M. Whatever happened to qualitative description? Research in Nursing & Health, 23(4), (2000), 334--340.Google ScholarCross Ref
- Stoll, J., Tashman, C.S., Edwards, W.K. & Spafford, K. Sesame: informing user security decisions with system visualization. In CHI '08 (2008), 1045--1054. Google ScholarDigital Library
- Wack, J.P., Cutler, K., & Pole, J. Guidelines on firewalls and firewall policy: recommendations of the NIST. U.S. Dept. of Commerce, Technology Administration, NIST (2002).Google Scholar
Index Terms
- Investigating an appropriate design for personal firewalls
Recommendations
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls
SafeConfig '10: Proceedings of the 3rd ACM workshop on Assurable and usable security configurationEven though personal firewalls are an important aspect of security for the users of personal computers, little attention has been given to their usability. We conducted semi-structured interviews with a diverse set of participants to gain an ...
A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings
SOUPS '11: Proceedings of the Seventh Symposium on Usable Privacy and SecurityWe used an iterative process to design firewall warnings in which the functionality of a personal firewall is visualized based on a physical security metaphor. We performed a study to determine the degree to which our proposed warnings are ...
Using Personal Data to Support Authentication: User Attitudes and Suitability
MUM '21: Proceedings of the 20th International Conference on Mobile and Ubiquitous MultimediaDynamic personal data based on a user’s activity, such as recent visited physical locations, browsing history, and call logs, update frequently, making it a promising token for user authentication. However, it is not clear how users perceive this use of ...
Comments