Usable Security: A Systematic Literature Review

被引:8
作者
Di Nocera, Francesco [1 ]
Tempestini, Giorgia [1 ]
Orsini, Matteo [1 ]
机构
[1] Sapienza Univ Rome, Dept Planning Design & Technol Architecture, I-00196 Rome, Italy
关键词
usable security; usability; security; cybersecurity; cyber-security; authentication; developers; guidelines; behavior; FUZZY-LOGIC; AUTHENTICATION; USABILITY; DESIGN; PASSWORD; COMMUNICATION; PERCEPTIONS; AUDIO;
D O I
10.3390/info14120641
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Usable security involves designing security measures that accommodate users' needs and behaviors. Balancing usability and security poses challenges: the more secure the systems, the less usable they will be. On the contrary, more usable systems will be less secure. Numerous studies have addressed this balance. These studies, spanning psychology and computer science/engineering, contribute diverse perspectives, necessitating a systematic review to understand strategies and findings in this area. This systematic literature review examined articles on usable security from 2005 to 2022. A total of 55 research studies were selected after evaluation. The studies have been broadly categorized into four main clusters, each addressing different aspects: (1) usability of authentication methods, (2) helping security developers improve usability, (3) design strategies for influencing user security behavior, and (4) formal models for usable security evaluation. Based on this review, we report that the field's current state reveals a certain immaturity, with studies tending toward system comparisons rather than establishing robust design guidelines based on a thorough analysis of user behavior. A common theoretical and methodological background is one of the main areas for improvement in this area of research. Moreover, the absence of requirements for Usable security in almost all development contexts greatly discourages implementing good practices since the earlier stages of development.
引用
收藏
页数:19
相关论文
共 64 条
[21]  
Florêncio D, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P575
[22]   From facilitating interactivity to managing hyperconnectivity: 50 years of human-computer studies [J].
Gaines, Brian R. .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 131 :4-22
[23]   Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures [J].
Gao, Song ;
Mohamed, Manar ;
Saxena, Nitesh ;
Zhang, Chengcui .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (06) :1040-1053
[24]   Effective Risk Communication for Android Apps [J].
Gates, Christopher S. ;
Chen, Jing ;
Li, Ninghui ;
Proctor, Robert W. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (03) :252-265
[25]   Can You Hear Me Now? Audio and Visual Interactions That Change App Choices [J].
Gopavaram, Shakthidhar Reddy ;
Bhide, Omkar ;
Camp, L. Jean .
FRONTIERS IN PSYCHOLOGY, 2020, 11
[26]   "I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices [J].
Gorski, Peter Leo ;
Moeller, Sebastian ;
Wiefling, Stephan ;
Lo Iacono, Luigi .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (09) :3467-3484
[27]   Using Screen Brightness to Improve Security in Mobile Social Network Access [J].
Guerar, Meriem ;
Migliardi, Mauro ;
Merlo, Alessio ;
Benmohammed, Mohamed ;
Palmieri, Francesco ;
Castiglione, Aniello .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :621-632
[28]  
Gutfleisch M., 2022, P 43 IEEE S SEC PRIV
[29]   Hierarchy of users' web passwords: Perceptions, practices and susceptibilities [J].
Haque, S. M. Taiabul ;
Wright, Matthew ;
Scielzo, Shannon .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2014, 72 (12) :860-874
[30]   Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations [J].
Hartwig, Katrin ;
Reuter, Christian .
BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (07) :1357-1380