Less is More Usable: Measuring Security Usability as Energy Efficiency
نویسنده
چکیده
Resonating with the theme “Blue Ocean Research”, this research explores the usability of informationsystems with concepts typically used to measure the efficiency of a mechanical system. Security ismeasured not by how often it succeeds, but how often it fails. Usability is frequently in the eye of thebeholder, and often measured by objective user response. This creates a challenge to developreproducible metrics. Security usability presents a more unique problem than ordinary usability. Unlikemost functionality in computer interfaces, navigating security is an interruption to the primary objective(Gebauer et al. 2011). If the security is sufficiently disruptive to progress toward the primary objective, auser will either go around the security, or turn it off (Cranor and Garfinkel 2005). Therefore securityusability is key to keeping the security in place.Predicting security usability of an interface challenges designers (Sasse et al. 2001). Providing a methodto quantify usability of security interfaces takes the guesswork out of security usability design andprovides an avenue for communicating the merits of a design. This paper proposes a usability metric thatapplies the 1st Law of Thermodynamics to the interaction of humans with computer security interfaces.
منابع مشابه
SEIMCHA: a new semantic image CAPTCHA using geometric transformations
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original imag...
متن کاملMeasuring the Usability and Security of Permuted Passwords on Mobile Platforms
Password entry on mobile devices significantly impacts both usability and security, but there is a lack of usable security research in this area, specifically for complex password entry. To address this research gap, we set out to assign strength metrics to passwords for which we already had usability data, in an effort to have a more meaningful comparison between usability and security. This d...
متن کاملNetwork Architectures and Services Net 2010-02-01 Proceedings of the Seminar Innovative Internet Technologies and Mobile Communication (iitm) Proceedings of the Seminar Innovative Internet Technologies and Mobile Communication (iitm) Cataloging-in-publication Data
A Wireless Sensor Network (WSN) is a tool with many applications. Because of its characteristic structure and hardware composition, it is much more difficult to ensure authentication, integrity and confidentiality in WSNs. Several algorithms have been proposed to fulfill these requirements. However, securing each OSI layer individually leads to inefficiencies in the operation of the network and...
متن کاملUsable Security in Smart Homes
A number of technologies are emerging that enable the creation of “Smart Homes”, which are households containing numerous networked devices all interacting with each other over the home network. As these Smart Homes become increasingly prevalent and users become more reliant on mobile devices to handle sensitive information, research related to the development of a usable security framework for...
متن کاملبررسی مقایسه ای قابلیت استفاده دو الگوی سناریونویسی سازمان بین المللی استاندارد و برنامه ارزیابی تمرینهای امنیت ملی آمریکا
Introduction: A systematic approach is needed for effective coping an incident. In such a system, the preparedness is the top priority. The organization’s readiness depends on some factors, including regular exercises. To conduct a proper exercise it is necessary to have a comprehensive scenario. Despite of repetitive execution of exercises, there is no commonly accepted template for it. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015