skip to main content
10.1145/1179576.1179598acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

USEable security: interface design strategies for improving security

Published: 03 November 2006 Publication History

Abstract

As people start depending more on technology and the internet they are opening themselves up to new risks. In this project, we specifically investigated wireless router interfaces to understand the needs of users when they configure security. Two studies were conducted: a baseline study comparing the interfaces of two routers on the market and a study comparing a prototype and the Linksys interface. The baseline study showed that there was no difference between the current interfaces. We then conducted a controlled experiment with a prototype that gave visual feedback. The prototype showed significant improvement in level of security achieved.

References

[1]
Bishop, M. "Psychological Acceptability Revisited", in Security and Usability edited by Cranor, L.F., Garfinkel, S., 2005, pg 1--11.
[2]
Chin, J.P., Diehl, V., A, Norman, K. "Developing of an Instrument Measuring User Satisfaction of the Human Computer Interface", Proceedings of ACM CHI 1988, pp. 213--218, 1988.
[3]
Guo, C., Koh, V., Tang, A. "Design and Evaluation for Secure 802.11 Network Configuration", SOUPS, 2005.
[4]
Garfinkel, S, Miller, R. "Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express", SOUPS, 2005.
[5]
Karat, C., Brodie, Karat, J. "Usability Design and Evaluation for Privacy and Security Solutions", in Security and Usability edited by Cranor, L.F., Garfinkel, S., 2005, pg 47--73.
[6]
Maxion, R., Reeder, R. "User-Interface Dependability Through Mitigation of Human Error" Int. J. Hum.-Comput. Stud. 63, 1-2, July 2005, pg 25--50.
[7]
Sandvig, C., Shah, C. "Software Defaults as De Facto Regulation: The Case of Wireless APs", in Proceedings of the 33rd Telecommunications Policy Research Conference (TPRC) on Communication, Information, and Internet Policy, Arlington, Virginia, USA, 2005.
[8]
Whitten, A., Tygar, J.D. "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0", in Proceedings of the 8th USENIX Security Symposium, August 1999.
[9]
Yan, J, Blackwell, A., Anderson, R., Grant, A. "The Memorability and Security of Passwords", in Security and Usabilty edited by Cranor, L.F., Garfinkel, S., 2005, pg 129--1.

Cited By

View all
  • (2023)Comparison of methods for analyzing the correlation of user experience and information securityProceedings of the 2023 5th International Conference on Software Engineering and Development10.1145/3637792.3637794(8-16)Online publication date: 20-Oct-2023
  • (2020)Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use CasesJournal of Cyber Security Technology10.1080/23742917.2020.1843822(1-49)Online publication date: 23-Nov-2020
  • (2016)A Survey on Information Visualization for Network and Service ManagementIEEE Communications Surveys & Tutorials10.1109/COMST.2015.245053818:1(285-323)Online publication date: Sep-2017
  • Show More Cited By

Index Terms

  1. USEable security: interface design strategies for improving security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security
    November 2006
    138 pages
    ISBN:1595935495
    DOI:10.1145/1179576
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. evaluation
    2. security
    3. usability
    4. visual interfaces

    Qualifiers

    • Article

    Conference

    CCS06
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Comparison of methods for analyzing the correlation of user experience and information securityProceedings of the 2023 5th International Conference on Software Engineering and Development10.1145/3637792.3637794(8-16)Online publication date: 20-Oct-2023
    • (2020)Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use CasesJournal of Cyber Security Technology10.1080/23742917.2020.1843822(1-49)Online publication date: 23-Nov-2020
    • (2016)A Survey on Information Visualization for Network and Service ManagementIEEE Communications Surveys & Tutorials10.1109/COMST.2015.245053818:1(285-323)Online publication date: Sep-2017
    • (2013)Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study2013 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2013.6682757(430-437)Online publication date: Oct-2013
    • (2011)Guidelines for usable cybersecurity: Past and present2011 Third International Workshop on Cyberspace Safety and Security (CSS)10.1109/CSS.2011.6058566(21-26)Online publication date: Sep-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media