6. Usable Security, Economics, and Psychology

2021 ◽  
pp. 100-126
Keyword(s):  
2016 ◽  
Vol 14 (5) ◽  
pp. 40-46 ◽  
Author(s):  
Matthew Green ◽  
Matthew Smith

2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Author(s):  
Ricardo Mendoza-González ◽  
Jaime Muñoz Arteaga ◽  
Francisco Álvarez Rodríguez

Currently, many powerful applications designed to combat social deviations are available, like the web-filtering systems, which measure the content of a website before submitting it to the user, notifying whether the content of the website presents (or not) information related to pornography, violence, racism, among others, and prompting the user to not accessing the site, or even blocking access to the website. Nevertheless, frequently the feedback of these systems is not well-designed, which may confuse users and lead to mistakes, disappointments, and misunderstandings. In order to reduce this concern, a method is provided to developers with guidance in designing usable security notifications to be incorporated in web-filtering systems. The method is structured through a library of user interface design patterns which integrates essential concepts of security and usability. The authors show the effectiveness of the patterns by using an illustrative example as a proof-of-concept together with a preliminary study.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Peter L Gorski ◽  
Emanuel von Zezschwitz ◽  
Luigi Lo Iacono ◽  
Matthew Smith

Abstract We present a systematization of usable security principles, guidelines and patterns to facilitate the transfer of existing knowledge to researchers and practitioners. Based on a literature review, we extracted 23 principles, 11 guidelines and 47 patterns for usable security and identified their interconnection. The results indicate that current research tends to focus on only a subset of important principles. The fact that some principles are not yet addressed by any design patterns suggests that further work on refining these patterns is needed. We developed an online repository, which stores the harmonized principles, guidelines and patterns. The tool enables users to search for relevant guidance and explore it in an interactive and programmatic manner. We argue that both the insights presented in this article and the web-based repository will be highly valuable for students to get a good overview, practitioners to implement usable security and researchers to identify areas of future research.


2010 ◽  
Vol 22 (3) ◽  
pp. 153-164 ◽  
Author(s):  
Catherine S. Weir ◽  
Gary Douglas ◽  
Tim Richardson ◽  
Mervyn Jack

2008 ◽  
pp. 121-134
Author(s):  
Saad Shakhshir ◽  
Dimitris Kalofonos
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document