Abstract
From a previous study we have determined that commercial security products can suffer from a usability perspective, lacking the necessary attention to design in relation to their alert interfaces. The aim of the paper is to assess the usability of alerts in some of the leading Internet security packages, based upon a related set of usability criteria. The findings reveal that the interface design combined with the user’s relative lack of security knowledge are two major challenges that influence their decision making process. The analysis of the alert designs showed that four of the criteria are not addressed in any of the selected security measures and it would be desirable to consider the user’s previous decisions on similar alerts, and modify alerts according to the user’s previous behaviour.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Symantec: Symantec Internet Security Threat Report. Trends for January 07 – June 07, Symantec Enterprise Security, vol. XII (September 2007)
House of Lords. Science and Technology Committee. 5th Report of Session 2006–07. Personal Internet Security. United Kingdom Parliament. HL Paper 165–I. London: The Stationery Limited, http://www.parliament.the-stationery-office.co.uk/pa/ld200607/ldselect/ldsctech/165/165i.pdf (accessed: 15/11/2009)
Ibrahim, T., Furnell, S.M., Papadaki, M., Clarke, N.L.: Assessing the Challenges of Intrusion Detection Systems. In: Proceedings of the 7th Annual Security Conference. Las Vegas, USA (June 2-3, 2008)
Lai, K., Wren, D.: Antivirus, Internet Security and Total Security Performance Benchmarking, http://www.passmark.com/ftp/antivirus_09-performance-testing-ed1.pdf
Ibrahim, T., Furnell, S.M., Papadaki, M., Clarke, N.L.: Assessing the Usability of Personal Internet Security Tools. In: Proceedings of the 8th European Conference on Information Warfare and Security (ECIW 2009), Military Academy, Lisbon & the University of Minho, Braga, Portugal (July 6-7, 2009)
Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of ACM CHI’94 Conference, Boston, Massachusetts, USA, April 24-28, pp. 152–158 (1994)
Nielsen, J.: Ten usability heuristics, http://www.useit.com/papers/heuristic/heuristic_list.html (accessed: 14/12/2008)
Johnston, J., Eloff, J.H.P., Labuschagne, L.: Security and human computer interfaces. Computers & Security 22(8), 675–684 (2003)
Top Security Software, http://www.2009securitysoftwarereviews.com (accessed: 26/01/2009)
Barnett, R.J., Irwin, B.: Towards a Taxonomy of Network Scanning Techniques. In: Proceedings of the 2008 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries: Riding the Wave of technology (SAICSIT ’08), Wilderness, South Africa, October 6-8, pp. 1–7 (2008)
Nessus. The Network Vulnerability Scanner, http://www.nessus.org (accessed: 26/01/2009)
Nmap. Nmap Security Scanner, http://insecure.org/nmap (accessed: 26/01/2009)
Siraj, A., Vaughn, R.: A Dynamic Fusion Approach for Security Situation Assessment. In: Proceedings of the Fourth IASTED International Conference on Communication, Network, and Information Security (CNIS 2007), Berkeley, California (September 24-26, 2007)
Chiasson, S., van Oorschot, P.C., Biddle, R.: Even experts deserve usable security: Design guidelines for security management systems. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS ’07), Pittsburgh, PA, July 18-20 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ibrahim, T., Furnell, S.M., Papadaki, M., Clarke, N.L. (2010). Assessing the Usability of End-User Security Software. In: Katsikas, S., Lopez, J., Soriano, M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2010. Lecture Notes in Computer Science, vol 6264. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15152-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-15152-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15151-4
Online ISBN: 978-3-642-15152-1
eBook Packages: Computer ScienceComputer Science (R0)