Abstract
The purpose of this paper is to propose a preliminary framework for supporting usable security on the World Wide Web through adaptivity in user interface designs. In particular we elaborate the concept of “Adaptive Usable Security” and suggest that it is a promising research area aiming to organize and present information and functionalities in an adaptive format to diverse user groups, by using different levels of abstractions through appropriate interaction styles, terminology, information presentation and user modeling techniques related to security and/or privacy preserving tasks. Furthermore, we present components of a preliminary framework aiming to provide guidance in developing “adaptive usable secure” interactive systems. The results and implications of this paper can be considered valuable in elaborating a common architecture for future deployment of adaptive usable security systems on a variety of application areas and services through the World Wide Web.
Chapter PDF
Similar content being viewed by others
References
Department of Homeland Security: A Roadmap for Cybersecurity Research (2009), http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf
Brusilovsky, P., Kobsa, A., Nejdl, W.: The Adaptive Web: Methods and Strategies of Web Personalization. Springer, Heidelberg (2007)
Adams, A., Sasse, M.A.: Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. J. Communications of the ACM. 42(12), 40–46 (1999)
Cranor, L., Garfinkel, S.: O’Reilly Media, Inc. (2005)
Shay, R., Kelley, P., Komanduri, S., Mazurek, M., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L.: Correct Horse Battery Staple: Exploring the Usability of System-assigned Passphrases. In: ACM Symposium on Usable Privacy and Security, Article 7, 20 pages. ACM Press, New York (2012)
Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. J. ACM Computing Surveys 44(4), 41 pages (2012)
Fidas, C.A., Voyiatzis, A.G., Avouris, N.M.: When security meets usability: A user-centric approach on a crossroads priority problem. In: Proc. of Panhellenic Conference on Informatics, PCI 2010, pp. 112–117. IEEE Computer Society (2010)
Norman, D.: The Design of Everyday Things. Psychology of Everyday Action. New York (1988)
Su, X., Khoshgoftaar, T.: A Survey of Collaborative Filtering Techniques. J. Advances in Artificial Intelligence, Article 4, 19 pages (2009)
Riding, R., Cheema, I.: Cognitive Styles – An Overview and Integration. J. Educational Psychology 11(3-4), 193–215 (1991)
Schecter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The Emperor’s New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies. In: Proc. of IEEE Symposium on Security and Privacy (2007)
Falk, L., Prakash, A., Borders, K.: Analyzing Websites for User-Visible Security Design Flaws. In: Proc. of Symposium on Usable Privacy and Security, pp. 117–126. ACM Press (2008)
von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. J. Communications of the ACM 47, 56–60 (2004)
Fidas, C., Voyiatzis, A., Avouris, N.: On the Necessity of User-friendly CAPTCHA. In: Proc. of Human Factors in Computing Systems, CHI 2011, pp. 2623–2626. ACM Press (2011)
Smyth, B.: Case-based recommendation. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol. 4321, pp. 342–376. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Belk, M., Fidas, C., Germanakos, P., Samaras, G. (2014). On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, vol 8533. Springer, Cham. https://doi.org/10.1007/978-3-319-07620-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-07620-1_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07619-5
Online ISBN: 978-3-319-07620-1
eBook Packages: Computer ScienceComputer Science (R0)