A Perception Oriented Approach for Usable and Secure Interface Development

  • Mehmet Göktürk
  • İbrahim Şişaneci
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8520)


Developers generally try to make their systems secure by adding Information Security measures and components to User Interfaces. While applying these measures, usability of interfaces may decrease seriously. Developing secure and usable user interfaces became a necessity due to the fact that security and usability are both indispensable for users. To develop secure and usable interfaces, first, users’ perception of information security is analyzed. In this study, An Enhanced Users’ Perception of Information Security Model (EUPoIM) and Perception Oriented Usable & Secure Interface Development Model (POSUIDM) are proposed to empower developers in developing both secure and usable user interfaces.


Enterprise UX structure and process security perception usable security perception oriented approach 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cranor, L.F.: Security and Usability: Designing Secure Systems That People can Use. O’reilly (2007)Google Scholar
  2. 2.
    Möckel, C.: Usability and Security in EU E-Banking Systems Towards an Integrated Evaluation Framework. In: IEEE/IPSJ International Symposium on Applications and the Internet (2011)Google Scholar
  3. 3.
    Yeratziotis, A., Pottas, D., Van Greunen, D.: A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm. International Journal of Human-Computer Interaction 28(10), 678–694Google Scholar
  4. 4.
    Kainda, R., Flechais, I., Roscoe, A.W.: Security and Usability: Analysis and Evaluation. In: International Conference on ARES 2010, pp. 275–282 (2010)Google Scholar
  5. 5.
    Schultz, E.E., Proctor, R.W., Lien, M.-C., Salvendy, G.: Usability and Security An Appraisal of Usability Issues in Information Security Methods. Computers & Security 20(7), 620–634 (2001)CrossRefGoogle Scholar
  6. 6.
    Zurko, M.E., Simon, R.T.: User-centered security. In: Proceedings of the 1996 Workshop on New Security Paradigms, pp. 27–33. ACM (September 1996)Google Scholar
  7. 7.
    Fidas, C.A., Voyiatzis, A.G., Avouris, N.M.: When security meets usability: A user-centric approach on a crossroads priority problem. In: 2010 14th Panhellenic Conference on Informatics (PCI), pp. 112–117. IEEE (September 2010)Google Scholar
  8. 8.
    Cranor, L.F.: A Framework for Reasoning About the Human in the Loop. In: UPSEC 2008 Proceedings of the 1st Conference on Usability, Psychology, and Security, vol. 8, pp. 1–15 (2008)Google Scholar
  9. 9.
    Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Computers & Security 24(2), 124–133 (2005)CrossRefGoogle Scholar
  10. 10.
    Flinn, S., Lumsden, J.: User perceptions of privacy and security on the web. In: Privacy Security and Trust (2005)Google Scholar
  11. 11.
    Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring User Confidence in Smartphone Security and Privacy. In: Symposium on Usable Privacy and Security (SOUPS), Washington, DC, USA, July 11-13 (2012)Google Scholar
  12. 12.
    Huang, D.L., Rau, P.L.P., Salvendy, G.: Perception of Information Security. Behaviour & Information Technology 29(3), 221–232 (2010)CrossRefGoogle Scholar
  13. 13.
    Kamoun, F., Halaweh, M.: User Interface Design and E-Commerce Security Perception: An Empirical Study. International Journal of E-Business Research 8(2), 15 (2012)CrossRefGoogle Scholar
  14. 14.
    Chanko, E.: Factors that influence users’ perceptions of trust in e-commerce. School of Humanities and Informatics, University of Skövde, SWEDEN, M.Sc. dissertation in Computer Science (2004)Google Scholar
  15. 15.
    Salvendy, G.: Handbook of Human Factors and Ergonomics. Wiley-Interscience, New York (1997)Google Scholar
  16. 16.
    Cooper, D.: Psychology, Risk & Safety: Understanding How Personality & Perception can Influence Risk Taking. Professional Safety 48, 39–46 (2003)Google Scholar
  17. 17.
    Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human Factors and Information Security: Individual, Culture and Security Environment. Australian Goverment, Department of Defence, Defence Science and Technology Organization, Command, Control, Communications and Intelligence Division (2010)Google Scholar
  18. 18.
    Arteaga, J.M., Gonzáleza, R.M., Martinb, M.V., Vanderdoncktc, J., Álvarez-Rodrígueza, F.: A Methodology For Designing Information Security Feedback Based On User Interface Patterns. Advances in Engineering Software 40, 1231–1241 (2009)CrossRefGoogle Scholar
  19. 19.
    Fléchais, I.: Designing Secure and Usable Systems. PhD Thesis, University College London Department of Computer Science (February 2005)Google Scholar
  20. 20.
    Kuo, H.M., Chen, C.W.: Study Of Merchandise Information And Interface Design On B2C Websites. Journal of Marine Science and Technology 19(1), 15–25 (2011)MathSciNetGoogle Scholar
  21. 21.
    Liu, Y., Huang, D., Zhu, H., Rau, P.L.P.: Users’ Perception of Mobile Information Security. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), December 11-14, pp. 428–435 (2011)Google Scholar
  22. 22.
    Kim, C., Tao, W., Shin, N., Kim, K.: An Empirical Study of Customers’ Perceptions of Security and Trust in E-Payment Systems. Electronic Commerce Research and Applications 9(1), 84–95 (2010); Special Issue: Social Networks and Web 2.0Google Scholar
  23. 23.
    Morris, M.G., Dillon, A.: How User Perceptions Influence Software Use. IEEE Software 14(4), 58–65 (1997)CrossRefGoogle Scholar
  24. 24.
    Faily, S.: A Framework for Usable and Secure System Design. In: PhD Thesis, University of Oxford Wolfson College (2011)Google Scholar
  25. 25.
    González, R.M., Muñoz-Arteaga, J., Martin, M.V., Álvarez-Rodriguez, F., Calleros, J.G.: A Pattern Methodology to Specify Usable Security in Websites. In: IEEE 20th International Workshop on Database and Expert Systems Application (2009)Google Scholar
  26. 26.
    Cyr, D., Bonanni, C., Bowes, J., Ilsever, J.: Beyond Trust: Website Design Preferences Across Cultures. Journal of Global Information Management (January 2005)Google Scholar
  27. 27.
    Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: User Interface Design Affects Security: Patterns in Click-Based Graphical Passwords. Int. J. Inf. Secur. 8, 387–398 (2009)CrossRefGoogle Scholar
  28. 28.
    Egger, F.N.: Affective Design of E-Commerce User Interfaces: How to Maximize Perceived Trustworthiness. In: Proceedings of the International Conference on Affective Human Factors Design, London (2001)Google Scholar
  29. 29.
    Chang, H.H., Chen, S.W.: Consumer perception of interface quality, security, and loyalty in electronic commerce. Information & Management 46, 411–417 (2009)CrossRefGoogle Scholar
  30. 30.
    Radke, K., Boyd, C., Brereton, M., Nieto, J.G.: How HCI Design Influences Web Security Decisions. In: OZCHI 2010, Brisbane, Australia, November 22-26 (2010)Google Scholar
  31. 31.
    Fogg, B.J., Soohoo, C., Danielson, D.: How Do People Evaluate a Web Sites Credibility? Report. Persuasive Technology Lab Stanford University (2002)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Mehmet Göktürk
    • 1
  • İbrahim Şişaneci
    • 1
  1. 1.Gebze Institute of TechnologyGebzeTurkey

Personalised recommendations