Abstract
Usability and Security are two important concepts in any design. A system must be easy to use and at the same time secure, to prevent unauthorized users from gaining access to the system and the data stored in the system. The goal of this study is to review the efficacy of the user authentication methods implemented in systems used in emergency communication centers. Due to the nature of the tasks and the environment of emergency responding teams, their system needs to be available and easily accessible because time is an important factor for success. At the same time, the systems need to be highly secure due to the sensitive nature of the data being collected and communicated during the process. Surveys and interviews are used for this study to understand the user authentication methods currently adopted in public emergency communication systems, and the impact of the authentication method on the usability and security of the systems. The information collected through this study will inform developers and practitioners to design and choose more effective authentication mechanisms for emergency communication systems.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Acharya, S., Polawar, A., Pawar, P.: Two factor authentication using smartphone generated one time password. J. Comput. Eng. (IOSR-JCE) 11, 85–90 (2013)
Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 114–126. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74800-7_9
de Bordea, D.: Selecting a two-factor authentication system. Netw. Secur. 2007(7), 17–20 (2007)
Buttussi, B., Chittaro, L., Carchietti, E., Coppo, M.: Using mobile devices to support communication between emergency medical responders and deaf people. In: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 7–16 (2010)
Cohen, S., Ben-Asher, N., Meyer, J.: Towards information technology security for universal access. In: Stephanidis, C. (ed.) UAHCI 2011. LNCS, vol. 6765, pp. 443–451. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21672-5_48
Fang, S.-C., Chan, H.-L.: Human identification by quantifying similarity and dissimilarity in electrocardiogram phase space. Pattern Recogn. 42, 1824–1831 (2009). https://doi.org/10.1016/j.patcog.2008.11.020
Hackers have taken down dozens of 911 centers. Why is it so hard to stop them? https://www.nbcnews.com/news/us-news/hackers-have-taken-down-dozens-911-centers-why-it-so-n862206
ISO 9241-11: Ergonomics of human-system interaction—Part 11: Usability: Definitions and concepts (2018)
Katsini, C., Belk, M., Fidas, C., Avouris, N., Samaras, G.: Security and usability in knowledge-based user authentication: a review (2016). https://doi.org/10.1145/3003733.3003764
Komanduri, S., et al.: Of passwords and people: measuring the effect of password-composition policies. In: Conference on Human Factors in Computing Systems – Proceedings, pp. 2595–2604 (2011). https://doi.org/10.1145/1978942.1979321
Portman, M., Pirzada, A.: Wireless mesh networks for public safety and crisis management applications. IEEE Internet Comput. 12(1), 18–25 (2008)
Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI Soc. 24(3), 295–306 (2009)
Schneier, B.: Sensible authentication. ACM Queue - Game Dev. 74 (2004). http://queue.acm.org/detail.cfm?id=971595. Accessed Feb 2004
Yee, K.-P.: Aligning security and usability. IEEE Secur. Priv. 2, 48–55 (2004). https://doi.org/10.1109/MSP.2004.64
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Oluwafemi, A.J., Feng, J.H. (2019). Usability and Security: A Case Study of Emergency Communication System Authentication. In: Stephanidis, C. (eds) HCI International 2019 - Posters. HCII 2019. Communications in Computer and Information Science, vol 1032. Springer, Cham. https://doi.org/10.1007/978-3-030-23522-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-030-23522-2_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23521-5
Online ISBN: 978-3-030-23522-2
eBook Packages: Computer ScienceComputer Science (R0)