Skip to main content
Kent Academic Repository

Guidelines for Usable Cybersecurity: Past and Present

Nurse, Jason R. C., Creese, Sadie, Goldsmith, Michael, Lamberts, Koen (2011) Guidelines for Usable Cybersecurity: Past and Present. In: 2011 Third International Workshop on Cyberspace Safety and Security (CSS). 2011 Third International Workshop on Cyberspace Safety and Security (CSS). . pp. 21-26. IEEE ISBN 978-1-4577-1034-6. E-ISBN 978-1-4577-1035-3. (doi:10.1109/CSS.2011.6058566) (KAR id:67535)

Abstract

Usability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by the need for confidentiality, integrity, availability and other concerns, security features have become standard components of the digital environment which pervade our lives requiring use by novices and experts alike. As security features are exposed to wider cross-sections of the society, it is imperative that these functions are highly usable. This is especially because poor usability in this context typically translates into inadequate application of cybersecurity tools and functionality, thereby ultimately limiting their effectiveness. With this goal of highly usable security in mind, there have been a plethora of studies in the literature focused on identifying security usability problems and proposing guidelines and recommendations to address them. Our paper aims to contribute to the field by consolidating a number of existing design guidelines and defining an initial core list for future reference. Whilst investigating this topic, we take the opportunity to provide an up-to-date review of pertinent cybersecurity usability issues and evaluation techniques applied to date. We expect this research paper to be of use to researchers and practitioners with interest in cybersecurity systems which appreciate the human and social elements of design.

Item Type: Conference or workshop item (Paper)
DOI/Identification number: 10.1109/CSS.2011.6058566
Uncontrolled keywords: usability; computer security; guidelines; encryption; ISO standards
Subjects: Q Science
T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Jason Nurse
Date Deposited: 02 Jul 2018 13:57 UTC
Last Modified: 05 Nov 2024 11:07 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/67535 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.