Exploring User-Centered Security Design for Usable Authentication Ceremonies

被引:11
|
作者
Fassl, Matthias [1 ,2 ]
Grober, Lea Theresa [1 ,2 ]
Krombholz, Katharina [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Saarland Univ, Saarbrucken, Germany
来源
CHI '21: PROCEEDINGS OF THE 2021 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS | 2021年
关键词
Instant Messaging; Man-in-the-Middle (MitM); Authentication; Usability; User-Centered Design;
D O I
10.1145/3411764.3445164
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security technology often follows a systems design approach that focuses on components instead of users. As a result, the users' needs and values are not sufficiently addressed, which has implications on security usability. In this paper, we report our lessons learned from applying a user-centered security design process to a well-understood security usability challenge, namely key authentication in secure instant messaging. Users rarely perform these key authentication ceremonies, which makes their end-to-end encrypted communication vulnerable. Our approach includes collaborative design workshops, an expert evaluation, iterative storyboard prototyping, and an online evaluation. While we could not demonstrate that our design approach resulted in improved usability or user experience, we found that user-centered prototypes can increase the users' comprehension of security implications. Hence, prototypes based on users' intuitions, needs, and values are useful starting points for approaching long-standing security challenges. Applying complementary design approaches may improve usability and user experience further.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] User-centered design through learner-centered instruction
    Altay, Burcak
    TEACHING IN HIGHER EDUCATION, 2014, 19 (02) : 138 - 155
  • [32] The Networked Neighborhood - A User-Centered Design Study
    Renyi, Madeleine
    Guendogdu, Ramazan
    Kunze, Christophe
    Gaugisch, Petra
    Teuteberg, Frank
    2018 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND INNOVATION (ICE/ITMC), 2018,
  • [33] User-Centered Design Guidelines for Collaborative Software for Intelligence Analysis
    Scholtz, Jean
    Endert, Alex
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 478 - 482
  • [34] User-centered guidelines for design of mobile applications
    Fang, XW
    Chan, S
    Brzezinski, J
    Xu, S
    Lam, J
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 853 - 857
  • [35] Make User-Centered Design Sustainable in China
    Zhu, JunJie
    DESIGN, USER EXPERIENCE, AND USABILITY: THEORY, METHODS, TOOLS AND PRACTICE, PT 1, 2011, 6769 : 509 - 518
  • [36] User-centered design and Covid-19
    Posner I.
    Posner, Ilona (ilonap@gmail.com), 1600, Association for Computing Machinery (27): : 66 - 70
  • [37] User-Centered & Experience Design trend overview
    Xia, Yingchong
    Li, Juan
    2009 IEEE 10TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1-3: E-BUSINESS, CREATIVE DESIGN, MANUFACTURING - CAID&CD'2009, 2009, : 1424 - 1426
  • [38] User-centered design of a mobile medication management
    Sedlmayr, Brita
    Schoeffler, Jennifer
    Prokosch, Hans-Ulrich
    Sedlmayr, Martin
    INFORMATICS FOR HEALTH & SOCIAL CARE, 2019, 44 (02): : 152 - 163
  • [39] User-centered design and the normative politics of technology
    Garrety, K
    Badham, R
    SCIENCE TECHNOLOGY & HUMAN VALUES, 2004, 29 (02) : 191 - 212
  • [40] Critical Look at the User-Centered Design Competencies
    Kautonen, Heli
    Nieminen, Mika P.
    PROCEEDINGS OF THE NORDICHI '16: THE 9TH NORDIC CONFERENCE ON HUMAN-COMPUTER INTERACTION - GAME CHANGING DESIGN, 2016,