Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1089508.1089532guideproceedingsArticle/Chapter ViewAbstractPublication PagesgiConference Proceedingsconference-collections
Article
Free access

Gathering evidence: use of visual security cues in web browsers

Published: 07 May 2005 Publication History

Abstract

Web browsers support secure online transactions, and provide visual feedback mechanisms to inform the user about security. These mechanisms have had little evaluation to determine how easily they are noticed and how effectively they are used. This paper describes a preliminary study conducted to determine which elements are noted, which are ignored, and how easily they are found. We collected eyetracker data to study user's attention to browser security, and gathered additional subjective data through questionnaires. Our results demonstrated that while the lock icon is commonly viewed, its interactive capability is essentially ignored. We also found that certificate information is rarely used, and that people stop looking for security information after they have signed into a site. These initial results provide insights into how browser security cues might be improved.

References

[1]
Adams, A. and M. A. Sasse (1999). "Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures." Communications of the ACM 42(12): 40--46.
[2]
Bartram, L., C. Ware, et al. (2001). Moving Icons: Detection and Distraction. Interact 2001, Tokyo, Japan.
[3]
DIMACS (2004). Program of the DIMACS Workshop on Usable Privacy and Security Software.
[4]
Friedman, B., D. C. Howe, et al. (2002). Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design. Thirty-Fifth Annual Hawaii International Conference on System Sciences.
[5]
Friedman, B., D. Hurley, et al. (2002). Users' conceptions of Web security: A comparative study. CHI 2002, Minneapolis, MN.
[6]
IEEE (2004). IEEE Security and Privacy Magazine Special Issue on Security and Usability, IEEE Computer Society.
[7]
Saltzer, J. H. and M. D. Schroeder (1975). "The Protection of Information in Computer Systems." Proceedings of the IEEE 63(9): 1278--1308.
[8]
Tobii Technology AB (2003). User manual, Tobii eye-tracker.
[9]
Whitten, A. and J. D. Tygar (1999). Why Johnny can't encrypt: A usability evaluation of PGP 5.0. 8th Usenix Security Symposium, Washington, D.C.
[10]
Yurcik, W., J. Barlow, et al. (2003). Two Visual Computer Security Network Monitoring Tools Incorporating Operator Interface Requirements. CHI 2003 Workshop on Human-Computer Interaction and Security Systems, Ft. Lauderdale, Florida.

Cited By

View all
  • (2023)Investigating security indicators for hyperlinking within the metaverseProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632219(605-620)Online publication date: 7-Aug-2023
  • (2023)Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing AttacksExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585658(1-15)Online publication date: 19-Apr-2023
  • (2020)One size does not fit allProceedings of the ACM/IEEE 42nd International Conference on Software Engineering10.1145/3377811.3380387(136-148)Online publication date: 27-Jun-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
GI '05: Proceedings of Graphics Interface 2005
May 2005
256 pages
ISBN:1568812655

Sponsors

  • CHCCS: The Canadian Human-Computer Communications Society

Publisher

Canadian Human-Computer Communications Society

Waterloo, Canada

Publication History

Published: 07 May 2005

Author Tags

  1. secure web-based transactions
  2. usable security
  3. visual feedback
  4. web browsing

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 206 of 508 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)68
  • Downloads (Last 6 weeks)15
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Investigating security indicators for hyperlinking within the metaverseProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632219(605-620)Online publication date: 7-Aug-2023
  • (2023)Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing AttacksExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585658(1-15)Online publication date: 19-Apr-2023
  • (2020)One size does not fit allProceedings of the ACM/IEEE 42nd International Conference on Software Engineering10.1145/3377811.3380387(136-148)Online publication date: 27-Jun-2020
  • (2019)The web's identity crisisProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361457(1715-1732)Online publication date: 14-Aug-2019
  • (2019)The impact of secure transport protocols on phishing efficacyProceedings of the 12th USENIX Conference on Cyber Security Experimentation and Test10.5555/3359012.3359021(9-9)Online publication date: 12-Aug-2019
  • (2018)In search of perfect usersProceedings of the 30th Australian Conference on Computer-Human Interaction10.1145/3292147.3292231(572-576)Online publication date: 4-Dec-2018
  • (2018)Pride and Prejudice in Progressive Web AppsProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243867(1731-1746)Online publication date: 15-Oct-2018
  • (2017)Fishing for phishers. Improving Internet users' sensitivity to visual deception cues to prevent electronic fraudComputers in Human Behavior10.1016/j.chb.2016.12.04469:C(421-436)Online publication date: 1-Apr-2017
  • (2016)Rethinking connection security indicatorsProceedings of the Twelfth USENIX Conference on Usable Privacy and Security10.5555/3235895.3235897(1-13)Online publication date: 22-Jun-2016
  • (2015)A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware WarningsProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813660(479-491)Online publication date: 12-Oct-2015
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media