Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1463160.1463191acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnordichiConference Proceedingsconference-collections
research-article

Threats or threads: from usable security to secure experience?

Published: 20 October 2008 Publication History

Abstract

While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate security experience, and the full focus on experience proposed by McCarthy & Wright lead to three very different interaction concerns, analytically and as regards design. We illustrate these differences by examples, and conclude with a discussion of how to advance the field of usable security.

References

[1]
Bannon, L. (1986). From human factors to human actors: the role of psychology and human-computer interaction studies in system design. In Greenbaum, J. & Kyng, M. (eds). Design at work: cooperative design of computer systems, pp. 25--44, Erlbaum.
[2]
Bertelsen O. W. (2006). Tertiary Artefactness at the Interface, In Fishwick, P. (ed). Aesthetic Computing, pp. 357--368, MIT press.
[3]
Bødker, S. (2006). When second wave HCI meets third wave challenges. In Mørch, A. Morgan, K. Bratteteig, T. Ghosh, G. & Svanææs, D. (eds.): Proceedings of the 4th Nordic Conference on Human-Computer interaction: Changing Roles, pp. 1--8. ACM Press.
[4]
Bødker, S. (1999). Computer applications as mediators of design and use - a developmental perspective. Doctoral dissertation, Department of Computer Science, University of Aarhus, DAIMI PB-542.
[5]
Corbin, J. & Strauss, A. (1990). Basics of Qualitative Research: Grounded Theory Procedures and Techniques. SAGE Publications, London, 1990.
[6]
Danish IT security Council: Pervasive computing -- IT security and privacy, http://www.brics.dk/~michael/articles/rfits-uk.pdf
[7]
DiGioia P. & Dourish, P. (2005) Social navigation as a model for usable security. Proceedings of the 2005 symposium on Usable privacy and security, pp. 101--108.
[8]
Flinn, S. & Lumsden, J. (2005). User Perceptions of Privacy and Security on the Web. Proceedings of the Third Annual Conference on Privacy. http://www.lib.unb.ca/Texts/PST/2005/pdf/flinn.pdf
[9]
Gasser, L. (1986). The integration of computing and routine work. ACM TOIS 4(3), 205--225.
[10]
Hardee, J. B., West, R., & Mayhorn, C. B. (2006). To Download or Not to Download: An Examination of Computer Security Decision Making. Interactions Magazine 2006 May-June, 32--37.
[11]
Kammersgaard, J. (1988). Four different perspectives on Human-Computer Interaction. International journal of Man-Machine Studies, vol. 28, pp 343--362.
[12]
McCarthy, J., & Wright, P. (2004). Technology As Experience. The MIT Press.
[13]
Norman, D. A. (2002). Emotion and design: Atrractive things work better. Interactions Magazine, ix (4), 36--42.
[14]
Pagter, J. I. & Pedersen, M. G. (2008) A Sense of Security in Pervasive Computing-Is the Light on When the Refrigerator Door Is Closed? LNCS pp. 383--388. Springer, Heidelberg.
[15]
Palen, L. & Bøødker, S. (2008). Don't Get Emotional. In: Peter C., Beale R. (eds.): Affect and Emotion in Human-Computer Interaction. LNCS, vol. 4868, pp. 12--22. Springer, Heidelberg.
[16]
Whitten, A & Tygar, D. (1999). Why Johnny Can't Encrypt -- A Usability Evaluation of PGP 5.0. In Cranor, L. & Simson, G. (eds). Security and Usability: Designing Secure Systems that People Can Use, O'Reilly (2005), pp. 679--702.
[17]
Yee, K. 2002. User Interaction Design for Secure Systems. In Proceedings of the 4th international Conference on information and Communications Security (December 09--12, 2002). In Deng, R. H., Qing, S., Bao, F. & Zhou, J. (eds.) Lecture Notes In Computer Science, vol. 2513, pp. 278--290. Springer-Verlag, London.

Cited By

View all
  • (2024)Navigating the landscape of security modelling: the MORS gridJournal of Cybersecurity10.1093/cybsec/tyae02410:1Online publication date: 14-Nov-2024
  • (2023)Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 WebsitesSustainability10.3390/su15141104315:14(11043)Online publication date: 14-Jul-2023
  • (2023)Investigating Security Folklore: A Case Study on the Tor over VPN PhenomenonProceedings of the ACM on Human-Computer Interaction10.1145/36101937:CSCW2(1-26)Online publication date: 4-Oct-2023
  • Show More Cited By

Index Terms

  1. Threats or threads: from usable security to secure experience?

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    NordiCHI '08: Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
    October 2008
    621 pages
    ISBN:9781595937049
    DOI:10.1145/1463160
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Mangold International
    • Microsoft Dynamics

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 October 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. experience
    2. human-computer interaction
    3. usability
    4. usable security
    5. user experience
    6. user story collection
    7. user testing

    Qualifiers

    • Research-article

    Conference

    NordiCHI08
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 379 of 1,572 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Navigating the landscape of security modelling: the MORS gridJournal of Cybersecurity10.1093/cybsec/tyae02410:1Online publication date: 14-Nov-2024
    • (2023)Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 WebsitesSustainability10.3390/su15141104315:14(11043)Online publication date: 14-Jul-2023
    • (2023)Investigating Security Folklore: A Case Study on the Tor over VPN PhenomenonProceedings of the ACM on Human-Computer Interaction10.1145/36101937:CSCW2(1-26)Online publication date: 4-Oct-2023
    • (2022)Comparing user perceptions of anti-stalkerware apps with the technical realityProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563617(135-154)Online publication date: 8-Aug-2022
    • (2021)Exploring User-Centered Security Design for Usable Authentication CeremoniesProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445164(1-15)Online publication date: 6-May-2021
    • (2020)Innovation inaction or in action? the role of user experience in the security and privacy design of smart home camerasProceedings of the Sixteenth USENIX Conference on Usable Privacy and Security10.5555/3488905.3488916(185-204)Online publication date: 10-Aug-2020
    • (2019)Security - Visible, Yet Unseen?Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300835(1-13)Online publication date: 2-May-2019
    • (2017)“No Good Reason to Remove Features”Human Aspects of Information Security, Privacy and Trust10.1007/978-3-319-58460-7_3(25-44)Online publication date: 13-May-2017
    • (2015)Users as Prosumers of PETsStandards and Standardization10.4018/978-1-4666-8111-8.ch014(265-286)Online publication date: 2015
    • (2014)Users as Prosumers of PETsFrameworks of IT Prosumption for Business Development10.4018/978-1-4666-4313-0.ch012(178-199)Online publication date: 2014
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media