Skip to main content

Usability Issues in Security

  • Conference paper
Security Protocols XX (Security Protocols 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7622))

Included in the following conference series:

Abstract

Usability issues in security have been discussed such that users could use the security tools easier. On contrary we presume another aspect of usability issues in security; an interface which causes a slight disturbance and discomfort so that a user would be aware of security threats and risks. The idea is that we should not feel Anshin to be secure. Anshin is a Japanese indicating the sense of security. We need a risk-aware interface to notice an insecure situation so that we would install security countermeasures. It is a warning interface for the insecure situations. We show how we could implement such an interface in a mail system to prevent users from sending email messages to incorrect destination addresses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nielsen, J.: Usability Engineering. Academic Press (1993)

    Google Scholar 

  2. Stephens, R.T.: A framework for the identification of electronic commerce design elements that enable trust within the small hotel industry. In: Proc. of ACMSE 2004, pp. 309–314 (2004)

    Google Scholar 

  3. Pu, P., Chen, L.: Trust building with explanation interfaces. In: Proc. of the 11th International Conference on Intelligent User Interfaces (IUI 2006), pp. 93–100 (2006)

    Google Scholar 

  4. Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: Privacy and trust: Shiny happy people building trust?: photos on e-commerce websites and consumer trust. In: Proc. of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2003), vol. 5(1), pp. 121–128 (2003)

    Google Scholar 

  5. Whitten, A., Tygar, D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proc. of the 9th USENIX Security Symposium, pp. 169–184 (1999)

    Google Scholar 

  6. Fujihara, Y., Oikawa, H., Murayama, Y.: Towards an interface causing discomfort for security: A user survey on the factors of discomfort. In: Proc. of the Second IEEE SSIRI 2008, pp. 173–174 (2008)

    Google Scholar 

  7. Fujihara, Y., Mukai, M., Kanamori, Y., Murayama, Y.: An interface causing discomfort to prevent users from missending e-mail messages to incorrect addresses. Poster and Demonstration Paper Proc. of IFIP TM 2012, pp. 9–12 (2010)

    Google Scholar 

  8. Murayama, Y., Hikage, N., Hauser, C., Chakraborty, B., Segawa, N.: An Anshin Model for the Evaluation of the Sense of Security. In: Proc. of the 39th Hawaii International Conference on System Science (HICSS 2006), vol. 8, p. 205a (2006)

    Google Scholar 

  9. Murayama, Y., Fujihara, Y., Nishioka, D.: The Sense of Security and a Countermeasure for the False Sense. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 205–214. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Malcolm, J.: The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion). In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 215–222. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. Norman, D.A.: The Psychology of Everyday Things. Basic Books (1988)

    Google Scholar 

  12. International Electrotechnical Commission: Safety of household and similar electrical appliances — part 2: Particular requirements for microwave ovens (MOD IEC 60335-2-25) (1996)

    Google Scholar 

  13. U.S. Department of Energy: Natural Gas (2012), http://www.fossil.energy.gov/education/energylessons/gas/

  14. Sankarapandian, K., Little, T., Edwards, W.K.: TALC: Using Desktop Graffiti to Fight Software Vulnerability. In: Proc. of ACM CHI 2008, pp. 1055–1064 (2008)

    Google Scholar 

  15. Egelman, S., Cranor, L.F., Hong, J.: You’ve been warned: An empirical study of the effectiveness of web browser phishing warnings. In: Proc. of ACM CHI 2008, pp. 1065–1074 (2008)

    Google Scholar 

  16. Wogalter, M.S.: Communication–Human Information Processing (C-HIP) Model. In: Wogalter, M.S. (ed.) Handbook of Warnings, pp. 51–61. Lawrence Erlbaum Associates (2006)

    Google Scholar 

  17. Raja, F., Hawkey, K., Hsu, S., Wang, K.C., Beznosov, K.: A Brick Wall, a Locked Door, and a Bandit: A Physical Security Metaphor for Firewall Warnings. In: Proceeding of Symposium On Usable Privacy and Security (SOUPS 2011), pp. 122–131 (2011)

    Google Scholar 

  18. Oikawa, H.: A study of a causal structure model for a discomfort interface. Master’s thesis, Iwate Prefectural University Graduate School (2008) (in Japanese)

    Google Scholar 

  19. Ramsay, J.: A factor analysis of user cognition and emotion. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 1997), pp. 546–547 (1997)

    Google Scholar 

  20. Awad, N.F., Fitzgerald, K.: The Deceptive Behaviors that Offend Us Most About Spyware. Comm. of the ACM 48, 55–60 (2005)

    Article  Google Scholar 

  21. Takahashi, K., Nakatani, M., Nishida, S.: Information Presentation from the standpoint of a sense of security. In: Proc. of HIS 2002, pp. 289–292 (2002)

    Google Scholar 

  22. Tsuji, K., Okuda, T., Takahashi, K. and Ito, T.: Analyses of the discomforts aroused by stimulus sentences with reference to effects of modality and gender. The Japanese Journal of research on Emotions 3, 64–70 (2005) (in Japanese)

    Google Scholar 

  23. Hagiwara, H.: Sensory Aversion Degrees for Adolescents. Bulletin of Junior College of Shukutoku 45, 89–113 (2006) (in Japanese)

    Google Scholar 

  24. Fujihara, Y., Murayama, Y.: A user survey on the interface causing discomfort for warning. In: Mat́rai, R. (ed.) User Interfaces, pp. 21–34. INTECH (2010)

    Google Scholar 

  25. Lieberman, E., Miller, R.C.: Facemail: Showing Faces of Recipients to Prevent Misdirected Email. In: Proceeding of Symposium On Usable Privacy and Security (SOUPS 2007), pp. 122–131 (2007)

    Google Scholar 

  26. Fujihara, Y., Kanamori, Y., Mukai, M., Saito, Y., Murayama, Y.: A preliminary experiment on a warning interface causing discomfort for sense of security, Anshin. In: Proceedings of the International Workshop on Infrastructure Assurance, pp. 69–75 (2010)

    Google Scholar 

  27. Reinecke, K., Bernstein, A.: Improving Performance, Perceived Usability, and Aesthetics with Culturally Adaptive User Interfaces. ACM Transactions on Computer–Human Interaction 18(22), Article 8 (2011)

    Google Scholar 

  28. Hofstede, G.: Culture’s Consequences: Comparing Values, Behaviors and Organizations across Nations, 2nd edn. Sage Publications (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Murayama, Y., Fujihara, Y., Saito, Y., Nishioka, D. (2012). Usability Issues in Security. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35694-0_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35693-3

  • Online ISBN: 978-3-642-35694-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics