skip to main content
10.1145/1753846.1754113acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Investigating an appropriate design for personal firewalls

Authors Info & Claims
Published:10 April 2010Publication History

ABSTRACT

Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to understand participants' knowledge, requirements, expectations, and misconceptions for personal firewalls. Analysis of 10 interviews shows that different design decisions (i.e., level of automation, multiple profile settings) are appropriate for users with different levels of security knowledge and experience.

References

  1. Dourish, P., Grinter, R.E., de la Flor, J.D., & Joseph, M. Security in the wild: user strategies for managing security as an everyday problem. Personal and Ubiquitous Computing, 8 (2004), 391--401. Google ScholarGoogle ScholarCross RefCross Ref
  2. Downs, J. S., Holbrook, M. B., & Cranor, L. F. Decision strategies and susceptibility to phishing. In SOUPS '06, vol. 149 (2006), 79--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Edwards, W. K., Poole, E. S., & Stoll, J. Security automation considered harmful? In NSPW '07 (2007), 33--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Egelman, S., Cranor, L. F., & Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08 (2008), 1065--1074. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hazari, S. Perceptions of end-users on the requirements in personal firewall software: an exploratory study. The Journal of Supercomputing, 17--3 (2005), 47--56.Google ScholarGoogle Scholar
  6. Herzog A. & Shahmehri N. Usability and security of personal firewalls. New Approaches for Security, Privacy in Complex Environments (2007), 37--48.Google ScholarGoogle Scholar
  7. Johnston, J., Eloff, J.H.P. & Labuschagneb, L. Security and human computer interfaces. Computers and Security, 22 (2003), 675--684.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Raja, F., Hawkey, K. & Beznosov, K. Revealing hidden context: improving mental models of personal firewall users. In SOUPS '09 (2009), 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sandelowski, M. Whatever happened to qualitative description? Research in Nursing & Health, 23(4), (2000), 334--340.Google ScholarGoogle ScholarCross RefCross Ref
  10. Stoll, J., Tashman, C.S., Edwards, W.K. & Spafford, K. Sesame: informing user security decisions with system visualization. In CHI '08 (2008), 1045--1054. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Wack, J.P., Cutler, K., & Pole, J. Guidelines on firewalls and firewall policy: recommendations of the NIST. U.S. Dept. of Commerce, Technology Administration, NIST (2002).Google ScholarGoogle Scholar

Index Terms

  1. Investigating an appropriate design for personal firewalls

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI EA '10: CHI '10 Extended Abstracts on Human Factors in Computing Systems
          April 2010
          2219 pages
          ISBN:9781605589305
          DOI:10.1145/1753846

          Copyright © 2010 Copyright is held by the author/owner(s)

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 April 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • extended-abstract

          Acceptance Rates

          CHI EA '10 Paper Acceptance Rate350of1,346submissions,26%Overall Acceptance Rate6,164of23,696submissions,26%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader