skip to main content
10.1145/1753846.1754113acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Investigating an appropriate design for personal firewalls

Published: 10 April 2010 Publication History

Abstract

Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to understand participants' knowledge, requirements, expectations, and misconceptions for personal firewalls. Analysis of 10 interviews shows that different design decisions (i.e., level of automation, multiple profile settings) are appropriate for users with different levels of security knowledge and experience.

References

[1]
Dourish, P., Grinter, R.E., de la Flor, J.D., & Joseph, M. Security in the wild: user strategies for managing security as an everyday problem. Personal and Ubiquitous Computing, 8 (2004), 391--401.
[2]
Downs, J. S., Holbrook, M. B., & Cranor, L. F. Decision strategies and susceptibility to phishing. In SOUPS '06, vol. 149 (2006), 79--90.
[3]
Edwards, W. K., Poole, E. S., & Stoll, J. Security automation considered harmful? In NSPW '07 (2007), 33--42.
[4]
Egelman, S., Cranor, L. F., & Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In CHI '08 (2008), 1065--1074.
[5]
Hazari, S. Perceptions of end-users on the requirements in personal firewall software: an exploratory study. The Journal of Supercomputing, 17--3 (2005), 47--56.
[6]
Herzog A. & Shahmehri N. Usability and security of personal firewalls. New Approaches for Security, Privacy in Complex Environments (2007), 37--48.
[7]
Johnston, J., Eloff, J.H.P. & Labuschagneb, L. Security and human computer interfaces. Computers and Security, 22 (2003), 675--684.
[8]
Raja, F., Hawkey, K. & Beznosov, K. Revealing hidden context: improving mental models of personal firewall users. In SOUPS '09 (2009), 1--12.
[9]
Sandelowski, M. Whatever happened to qualitative description? Research in Nursing & Health, 23(4), (2000), 334--340.
[10]
Stoll, J., Tashman, C.S., Edwards, W.K. & Spafford, K. Sesame: informing user security decisions with system visualization. In CHI '08 (2008), 1045--1054.
[11]
Wack, J.P., Cutler, K., & Pole, J. Guidelines on firewalls and firewall policy: recommendations of the NIST. U.S. Dept. of Commerce, Technology Administration, NIST (2002).

Cited By

View all
  • (2023)Implementation method of non-bypassable PC application firewalls using virtualization technologies2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00066(435-442)Online publication date: 17-Dec-2023
  • (2017)Systematic Literature Review on Usability of Firewall ConfigurationACM Computing Surveys10.1145/313087650:6(1-35)Online publication date: 6-Dec-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '10: CHI '10 Extended Abstracts on Human Factors in Computing Systems
April 2010
2219 pages
ISBN:9781605589305
DOI:10.1145/1753846

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. personal firewall
  2. usable security

Qualifiers

  • Extended-abstract

Conference

CHI '10
Sponsor:

Acceptance Rates

CHI EA '10 Paper Acceptance Rate 350 of 1,346 submissions, 26%;
Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Implementation method of non-bypassable PC application firewalls using virtualization technologies2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys60770.2023.00066(435-442)Online publication date: 17-Dec-2023
  • (2017)Systematic Literature Review on Usability of Firewall ConfigurationACM Computing Surveys10.1145/313087650:6(1-35)Online publication date: 6-Dec-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media