Exploring User-Centered Security Design for Usable Authentication Ceremonies

被引:11
|
作者
Fassl, Matthias [1 ,2 ]
Grober, Lea Theresa [1 ,2 ]
Krombholz, Katharina [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Saarland Univ, Saarbrucken, Germany
来源
CHI '21: PROCEEDINGS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS | 2021年
关键词
Instant Messaging; Man-in-the-Middle (MitM); Authentication; Usability; User-Centered Design;
D O I
10.1145/3411764.3445164
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security technology often follows a systems design approach that focuses on components instead of users. As a result, the users' needs and values are not sufficiently addressed, which has implications on security usability. In this paper, we report our lessons learned from applying a user-centered security design process to a well-understood security usability challenge, namely key authentication in secure instant messaging. Users rarely perform these key authentication ceremonies, which makes their end-to-end encrypted communication vulnerable. Our approach includes collaborative design workshops, an expert evaluation, iterative storyboard prototyping, and an online evaluation. While we could not demonstrate that our design approach resulted in improved usability or user experience, we found that user-centered prototypes can increase the users' comprehension of security implications. Hence, prototypes based on users' intuitions, needs, and values are useful starting points for approaching long-standing security challenges. Applying complementary design approaches may improve usability and user experience further.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A User-Centered Model for Usable Security and Privacy
    Feth, Denis
    Maier, Andreas
    Polst, Svenja
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 74 - 89
  • [2] Enhancing Security in User-Centered Authentication using KERI
    Boi, Biagio
    De Santis, Marco
    Esposito, Christian
    2024 32ND EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PDP 2024, 2024, : 161 - 166
  • [3] User-Centered Design for Personalization
    Tran, Charity C.
    IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2012, 55 (01) : 102 - 103
  • [4] Adaptive User-Centered Security
    Wohlgemuth, Sven
    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, 2014, 8708 : 94 - 109
  • [5] User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
    Jeong, Jongkil Jay
    Shah, Syed Wajid Ali
    Nanda, Ashish
    Doss, Robin
    Nosouhi, Mohammad
    Webb, Jeb
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2024, 54 (05) : 554 - 564
  • [6] User-centered design in universal design resources?
    Law, Chris M.
    Jaeger, Paul T.
    McKay, Elspeth
    UNIVERSAL ACCESS IN THE INFORMATION SOCIETY, 2010, 9 (04) : 327 - 335
  • [7] User-centered design in universal design resources?
    Chris M. Law
    Paul T. Jaeger
    Elspeth McKay
    Universal Access in the Information Society, 2010, 9 : 327 - 335
  • [8] A Set of Heuristics for Usable Security and User Authentication
    Realpe, Paulo C.
    Collazos, Cesar A.
    Hurtado, Julio
    Granollers, Antoni
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [9] User-Centered Healthcare Design
    Duarte, Joana
    Guerra, Arminda
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE DEVELOPMENT FOR ENHANCING ACCESSIBILITY AND FIGHTING INFO-EXCLUSION (DSAI 2012), 2012, 14
  • [10] User-Centered Design in Procured Software Implementations
    Hocko, Jen
    JOURNAL OF USABILITY STUDIES, 2011, 6 (02) : 60 - 74