The challenges of understanding and using security: A survey of end-users

被引:73
作者
Furnell, SM [1 ]
Jusoh, A [1 ]
Katsabas, D [1 ]
机构
[1] Univ Plymouth, Sch Comp Commun & Elect, Network Res Grp, Plymouth PL4 8AA, Devon, England
关键词
security; usability; human-computer interaction; Internet Explorer; Word; Outlook Express;
D O I
10.1016/j.cose.2005.12.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications contain security features that are available for end-users to select and configure, as well as the potential to place users in situations where they must take security-related decisions. However, the manner in which these aspects are implemented and presented can often serve to complicate the process, such that users cannot actually use the security that they desire, or which may be expected of them. This paper presents the results of a survey of over 340 end-users in order to determine their understanding of the security features within Windows XP and three popular applications (Internet Explorer, Outlook Express, and Word). The study reveals some significant areas of difficulty, with many standard security features presenting apparent usability challenges for large proportions of the respondents. The results highlight the need for a more considered approach towards the presentation of security functionality if users are to have a realistic chance of protecting themselves. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 9 条
[1]  
Audit Commission, 2005, ICT FRAUD AB 2004 UP
[2]  
Carroll J., 2001, Human Computer Interaction in the Millennium
[3]  
CRA, 2003, GRAND RES CHALL INF
[4]   Why users cannot use security [J].
Furnell, S .
COMPUTERS & SECURITY, 2005, 24 (04) :274-279
[5]  
Furnell S, 2004, COMPUT FRAUD SECUR, P6
[6]   Security and human computer interfaces [J].
Johnston, J ;
Eloff, JHP ;
Labuschagne, L .
COMPUTERS & SECURITY, 2003, 22 (08) :675-684
[7]  
*MICR CORP, 2005, MICR TOP 10 REAS INS
[8]  
Shneiderman Ben, 2016, Designing the user interface: strategies for effective human-computer interaction
[9]  
WHITTEN A, 1999, P 8 USENIX SEC S WAS