Usability: low tech, high security

E Blanchard - 2019 - theses.hal.science
This dissertation deals with the field of usable security, particularly in the contexts of online
authentication and verifiable voting systems.The ever-expanding role of online accounts in …

Heuristics and models for evaluating the usability of security measures

D Feth, S Polst - Proceedings of Mensch und Computer 2019, 2019 - dl.acm.org
… , or usability experts. In the worst-case, users reject or circumvent even strong security
measures and technically secure systems become insecure. To tackle the problem of unusable …

Security and usability

J Chen, M Wong, L Zhang - User requirements for wireless, 2022 - api.taylorfrancis.com
… But it does not mean that more strong security provided more perfect for the users. Strong
security can also be a problem for usable security. For example, encrypting too strong will …

Prototyping usable privacy and security systems: Insights from experts

F Mathis, K Vaniea, M Khamis - International Journal of Human …, 2022 - Taylor & Francis
user experience as well as on privacy and security issues such as user authentication, e-mail
security, anti-phishing, web privacy, mobile security/… both usability and security concerns …

A Study on the Need of the Usable Security in the Corelation between IT Security and User Experience

S Lee - International Journal of Internet, Broadcasting and …, 2017 - koreascience.kr
… The accredited certificate provides high security however, it is used without consideration
for service environment or the user. Therefore, the user may find an inconvenience problem in …

A qualitative study on usability and acceptability of Yubico security key

S Das, G Russo, AC Dingman, J Dev, O Kenny… - … on socio-technical …, 2018 - dl.acm.org
… to use the security technology. Here we consider the rst two of these usability, and the third
… investigated the end user experience of con guring and using the security key by combining …

Usability is not Enough: Lessons Learned from'Human Factors in Security'Research for Verifiability

O Kulyk, M Volkamer - Cryptology ePrint Archive, 2018 - eprint.iacr.org
… in other security domains, however, reveals other reasons aside from poor usability, that hinder
the proper adoption of security … measures aside from ensuring the usability of the cast as …

A survey of user experience in usable security and privacy research

D Jacobs, T McDaniel - International Conference on Human-Computer …, 2022 - Springer
… perceive security and privacy. First, we will investigate the findings from the literature to find
common themes in user experience across technology… focus on top security conferences and …

You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
… can deliver provably strong (if not perfect) protection from many such … strong security offered
by these mechanisms and actual low security in practice is often caused by the poor usability

More than just good passwords? A study on usability and security perceptions of risk-based authentication

S Wiefling, M Dürmuth, L Lo Iacono - … the 36th Annual Computer Security …, 2020 - dl.acm.org
… the usability and the security perceptions of RBA are not studied well. We present the results
of a between-group lab study (n=65) to evaluate usability and security … Only for high security