Usable Security: History, Themes, and ChallengesMorgan & Claypool Publishers, 1 oct. 2014 - 124 pages There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research. |
Table des matières
Introduction | 1 |
A Brief History of Usable Privacy and Security Research | 13 |
Major Themes in UPS Academic Research | 23 |
Lessons Learned | 87 |
Research Challenges | 93 |
The Next Ten Years | 105 |
Bibliography | 109 |
Authors Biographies | 149 |
Autres éditions - Tout afficher
Usable Security: History, Themes, and Challenges Simson Garfinkel,Heather Richter Lipford Aucun aperçu disponible - 2014 |
Usable Security: History, Themes, and Challenges Simson Garfinkel,Heather Richter Lipford Aucun aperçu disponible - 2014 |
Expressions et termes fréquents
access control accounts adversary application biometric Bonneau browser CAPTCHAs challenge computer security Computing Systems Conference on Human context created devices ecological validity Egelman encryption evaluated example Facebook Factors in Computing graphical authentication graphical passwords hashes Herley Human Factors IEEE impact implemented Information Security Interaction interface Internet laboratory study Lorrie Faith Cranor malware Mechanical Turk messages mobile Oorschot OpenID pairing participants passphrases password managers password strength performed phishing attacks platforms privacy and security privacy policies Proceedings protect public key requirements result Richter Lipford S/MIME schemes secure systems security and privacy Security and Usability security mechanisms security research sharing shoulder surfing SIGCHI Conference significant Simson Garfinkel smartphone social media SOUPS spoofing Symposium on Usable toolbar Tygar understanding usability and security Usable Privacy usable security user study user’s visual warnings websites Workshop XKCD York