Usable Security: A Systematic Literature Review

被引:8
作者
Di Nocera, Francesco [1 ]
Tempestini, Giorgia [1 ]
Orsini, Matteo [1 ]
机构
[1] Sapienza Univ Rome, Dept Planning Design & Technol Architecture, I-00196 Rome, Italy
关键词
usable security; usability; security; cybersecurity; cyber-security; authentication; developers; guidelines; behavior; FUZZY-LOGIC; AUTHENTICATION; USABILITY; DESIGN; PASSWORD; COMMUNICATION; PERCEPTIONS; AUDIO;
D O I
10.3390/info14120641
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Usable security involves designing security measures that accommodate users' needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. Numerous studies have addressed this balance. These studies, spanning psychology and computer science/engineering, contribute diverse perspectives, necessitating a systematic review to understand strategies and findings in this area. This systematic literature review examined articles on usable security from 2005 to 2022. A total of 55 research studies were selected after evaluation. The studies have been broadly categorized into four main clusters, each addressing different aspects: (1) usability of authentication methods, (2) helping security developers improve usability, (3) design strategies for influencing user security behavior, and (4) formal models for usable security evaluation. Based on this review, we report that the field's current state reveals a certain immaturity, with studies tending toward system comparisons rather than establishing robust design guidelines based on a thorough analysis of user behavior. A common theoretical and methodological background is one of the main areas for improvement in this area of research. Moreover, the absence of requirements for Usable security in almost all development contexts greatly discourages implementing good practices since the earlier stages of development.
引用
收藏
页数:19
相关论文
共 64 条
[1]   On improving the memorability of system-assigned recognition-based passwords [J].
Al-Ameen, Mahdi Nasrullah ;
Marne, Sonali T. ;
Fatema, Kanis ;
Wright, Matthew ;
Scielzo, Shannon .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (05) :1115-1131
[2]   Exploring the Potential of GeoPass: A Geographic Location-Password Scheme [J].
Al-Ameen, Mahdi Nasrullah ;
Wright, Matthew .
INTERACTING WITH COMPUTERS, 2017, 29 (04) :605-627
[3]   Evaluating the Usable-Security of Healthcare Software Through Unified Technique of Fuzzy Logic, ANP and TOPSIS [J].
Al-Zahrani, Fahad Ahmed .
IEEE ACCESS, 2020, 8 :109905-109916
[4]   User-friendly security patterns for designing social network websites [J].
Alemerien, Khalid .
International Journal of Technology and Human Interaction, 2017, 13 (01) :39-60
[5]   Design and Evaluation of an Authentication Framework for Wearable Devices [J].
Alharbi, Abdullah ;
Alharbi, Talal .
IEEE ACCESS, 2020, 8 :80369-80381
[6]   A Simple and Secure Reformation-Based Password Scheme [J].
Ali, Mushtaq ;
Baloch, Amanullah ;
Waheed, Abdul ;
Zareei, Mahdi ;
Manzoor, Rimsha ;
Sajid, Hassam ;
Alanazi, Faisal .
IEEE ACCESS, 2021, 9 :11655-11674
[7]   User perception of Bitcoin usability and security across novice users [J].
Alshamsi, Abdulla ;
Andras, Peter .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 126 :94-110
[8]   Why phishing still works: User strategies for combating phishing attacks [J].
Alsharnouby, Mohamed ;
Alaca, Furkan ;
Chiasson, Sonia .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2015, 82 :69-82
[9]   Usability of the login authentication process: passphrases and passwords [J].
Bhana, Bhaveer ;
Flowerday, Stephen Vincent .
INFORMATION AND COMPUTER SECURITY, 2022, 30 (02) :280-305
[10]   Leveraging human computation for pure-text Human Interaction Proofs [J].
Bicakci, Kemal ;
Kiziloz, Hakan Ezgi .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2016, 92-93 :44-54