Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems
The contribution of this paper is twofold. On the one hand, we report on the results of our investigation of different categories of usability issues. On the other hand, we introduce the ideas of context descriptive security models as a means of mastering the usability challenges of highly dynamic systems. Modern computer systems are involved in many situations of our daily lives. This means that newly deployed systems must be carefully designed in order to be correctly used by laypersons. The scenario we introduce shows that it is no longer feasible to argue that users must be educated in order to correctly operate these systems. As soon as such a system is deployed, for example, in a supermarket, the education-barrier will not be accepted: neither by the customer nor by the provider.
KeywordsSecurity Level Security Model Security Mechanism Usability Problem Usability Issue
Unable to display preview. Download preview PDF.
- 1.METRO AG: Metro’s future store initiative (2006), http://www.future-store.org
- 2.Dix, A.J., Finlay, J.E., Abowd, G.D., Beale, R.: Human Computer Interaction, 2nd edn. Prentice-Hall, Englewood Cliffs (1998)Google Scholar
- 3.CASPIAN: Consumers Against Supermarket Privacy Invasion and Numbering (2006), http://www.nocards.org
- 4.Kaiser, J., Reichenbach, M.: Evaluating security tools towards usable security. In: Proceedings of the 17th IFIP World Computer Congress (WCC 2002) (2002)Google Scholar
- 5.Markotten, D.G.T.: Benutzbare Sicherheit in informationstechnischen Systemen. PhD thesis, Albert-Ludwigs-University Freiburg (2003)Google Scholar
- 6.Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In: 8th USENIX Security Symposium (1999)Google Scholar
- 8.Flechais, I., Sasse, M.A.: Developing secure and usable software. In: Workshop on Human-Computer Interaction and Security Systems. ACM Press, New York (2003)Google Scholar
- 13.Dacier, M., Deswarte, Y., Kaâniche, M.: Models and tools for quantitative assessment of operational security. In: Information systems security: facing the information society of the 21st century, pp. 177–186. Chapman & Hall, Ltd., London (1996)Google Scholar
- 15.Accorsi, R.: On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. In: Proceedings of the International Information Security Conference Security and Privacy in Dynamic Environments (2006)Google Scholar