Advertisement

On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security

  • Marios Belk
  • Christos Fidas
  • Panagiotis Germanakos
  • George Samaras
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)

Abstract

The purpose of this paper is to propose a preliminary framework for supporting usable security on the World Wide Web through adaptivity in user interface designs. In particular we elaborate the concept of “Adaptive Usable Security” and suggest that it is a promising research area aiming to organize and present information and functionalities in an adaptive format to diverse user groups, by using different levels of abstractions through appropriate interaction styles, terminology, information presentation and user modeling techniques related to security and/or privacy preserving tasks. Furthermore, we present components of a preliminary framework aiming to provide guidance in developing “adaptive usable secure” interactive systems. The results and implications of this paper can be considered valuable in elaborating a common architecture for future deployment of adaptive usable security systems on a variety of application areas and services through the World Wide Web.

Keywords

Adaptive Interactive Systems User Modeling Usable Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Department of Homeland Security: A Roadmap for Cybersecurity Research (2009), http://www.cyber.st.dhs.gov/docs/DHS-Cybersecurity-Roadmap.pdf
  2. 2.
    Brusilovsky, P., Kobsa, A., Nejdl, W.: The Adaptive Web: Methods and Strategies of Web Personalization. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Adams, A., Sasse, M.A.: Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. J. Communications of the ACM. 42(12), 40–46 (1999)CrossRefGoogle Scholar
  4. 4.
    Cranor, L., Garfinkel, S.: O’Reilly Media, Inc. (2005)Google Scholar
  5. 5.
    Shay, R., Kelley, P., Komanduri, S., Mazurek, M., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L.: Correct Horse Battery Staple: Exploring the Usability of System-assigned Passphrases. In: ACM Symposium on Usable Privacy and Security, Article 7, 20 pages. ACM Press, New York (2012)Google Scholar
  6. 6.
    Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. J. ACM Computing Surveys 44(4), 41 pages (2012)Google Scholar
  7. 7.
    Fidas, C.A., Voyiatzis, A.G., Avouris, N.M.: When security meets usability: A user-centric approach on a crossroads priority problem. In: Proc. of Panhellenic Conference on Informatics, PCI 2010, pp. 112–117. IEEE Computer Society (2010)Google Scholar
  8. 8.
    Norman, D.: The Design of Everyday Things. Psychology of Everyday Action. New York (1988)Google Scholar
  9. 9.
    Su, X., Khoshgoftaar, T.: A Survey of Collaborative Filtering Techniques. J. Advances in Artificial Intelligence, Article 4, 19 pages (2009)Google Scholar
  10. 10.
    Riding, R., Cheema, I.: Cognitive Styles – An Overview and Integration. J. Educational Psychology 11(3-4), 193–215 (1991)CrossRefGoogle Scholar
  11. 11.
    Schecter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The Emperor’s New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies. In: Proc. of IEEE Symposium on Security and Privacy (2007)Google Scholar
  12. 12.
    Falk, L., Prakash, A., Borders, K.: Analyzing Websites for User-Visible Security Design Flaws. In: Proc. of Symposium on Usable Privacy and Security, pp. 117–126. ACM Press (2008)Google Scholar
  13. 13.
    von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. J. Communications of the ACM 47, 56–60 (2004)CrossRefGoogle Scholar
  14. 14.
    Fidas, C., Voyiatzis, A., Avouris, N.: On the Necessity of User-friendly CAPTCHA. In: Proc. of Human Factors in Computing Systems, CHI 2011, pp. 2623–2626. ACM Press (2011)Google Scholar
  15. 15.
    Smyth, B.: Case-based recommendation. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol. 4321, pp. 342–376. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Marios Belk
    • 1
  • Christos Fidas
    • 1
    • 2
  • Panagiotis Germanakos
    • 1
    • 3
  • George Samaras
    • 1
  1. 1.Department of Computer ScienceUniversity of CyprusNicosiaCyprus
  2. 2.Interactive Technologies Lab, HCI Group, Electrical and Computer Engineering DepartmentUniversity of PatrasPatrasGreece
  3. 3.SAP AGWalldorfGermany

Personalised recommendations