Trading off usability and security in user interface design through mental models

被引:15
作者
Mohamed, Mona A. [1 ]
Chakraborty, Joyram [2 ]
Dehlinger, Josh [2 ]
机构
[1] Towson Univ, Dept eBusiness & Technol Management, Towson, MD 21252 USA
[2] Towson Univ, Dept Comp & Informat Sci, Towson, MD USA
关键词
Usability; security; tacit knowledge; synergism; mental model; knowledge management; INFORMATION SECURITY; KNOWLEDGE MANAGEMENT; REQUIREMENTS; SYSTEM; ACCEPTANCE; BUSINESS; STRATEGY; TASK; LEARNABILITY; RATIONALITY;
D O I
10.1080/0144929X.2016.1262897
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this paper is to establish the foundations for developing a mental model that bridges the gap between usability and security in user-centred designs. To this purpose, a meta-model has been developed to align design features with the users' requirements through tacit knowledge elicitation. The meta-model describes the combinatorial relationships of Security, Usability and Mental (SUM) and how these components can be used to design a usable and secure system. The SUM meta-model led to the conclusion that there is no antagonism between usability and security. However, the degree of usable security depends on the ability of the designer to capture and implement the user's tacit knowledge. In fact, the SUM meta-model seeks the dilution of the trading-off effects between security and usability through compensating synergism of the tacit knowledge. A usability security cognitive map has been developed for the major constituents of usability and security to clarify the interactions and their influences on the meta-model stipulations. The three intersecting areas of the three components' relationships are manipulated to expand the Optimal Equilibrium Solution (OES) () expanse. To put the SUM meta-model into practice, knowledge management principles have been proposed for implementing user-centred security and user-centred design. This is accomplished by using collaborative brainpower from various knowledge constellations to design a system within the user's current and future perception boundaries. Therefore, different knowledge groups, processes, techniques, tactics and practices have been proposed for knowledge transfer and transformation during the mental model development.
引用
收藏
页码:493 / 516
页数:24
相关论文
共 204 条
  • [1] User preference of cyber security awareness delivery methods
    Abawajy, Jemal
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (03) : 236 - 247
  • [2] Usability meanings and interpretations in ISO standards
    Abran, A
    Khelifi, A
    Suryn, W
    Seffah, A
    [J]. SOFTWARE QUALITY JOURNAL, 2003, 11 (04) : 325 - 338
  • [3] Abu Bakar Siddique Hafiz, 2015, 2015 17th European Conference on Power Electronics and Applications (EPE'15 ECCE-Europe), P1, DOI 10.1109/EPE.2015.7311719
  • [4] Adebanjo D., 1998, International Journal of Quality Science, V3, P275
  • [5] Collaborative systems engineering and social-networking approach to design and modelling of smarter products
    Ahram, T.
    Karwowski, W.
    Amaba, B.
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2011, 30 (01) : 13 - 26
  • [6] Continuance use intention of enterprise instant messaging: a knowledge management perspective
    Ajjan, Haya
    Hartshorne, Richard
    Cao, Yingxia
    Rodriguez, Michael
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2014, 33 (07) : 678 - 692
  • [7] Al-Alawi A.I., 2007, Journal of Knowledge Management, V11, P22, DOI [10.1108/13673270710738898, DOI 10.1108/13673270710738898]
  • [8] Security considerations of doing business via the Internet: Cautions to be considered
    Aldridge, A
    White, M
    Forcht, K
    [J]. INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1997, 7 (01): : 9 - &
  • [9] Challenge Set Designs and User Guidelines for Usable and Secured Recognition-Based Graphical Passwords
    Aljahdali, Hani Moaiteq
    Poet, Ron
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 973 - 982
  • [10] [Anonymous], EVALUATION METHODOLO