Abstract
In this chapter, I summarise the challenges that make designing for usability and security hard, and outline the structure of this book.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sellen A, Rogers Y, Harper R, Rodden T. Reflecting human values in the digital age. Commun ACM. 2009;52(3):58–66.
Detica. The Cost of Cyber Crime: A Detics Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. UK Cabinet Office; 2011.
Nielsen J. Guerrilla HCI: using discount usability engineering to penetrate the intimidation barrier. In: Bias RG, Mayhew DJ, editors. Cost-justifying usability. Morgan Kaufmann; 1994. p. 242–272.
Schneier B. Secrets and lies : digital security in a networked world. John Wiley & Sons; 2000.
Swiderski F, Snyder W. Threat modeling. Microsoft Press; 2004.
Ghezzi C, Jazayeri M, Mandrioli D. Fundamentals of software engineering. 2nd ed. Prentice Hall; 2003.
ISO. ISO/IEC 13407: Human-Centered Design Processes for Interactive Systems. ISO/IEC; 1999.
Fléchais I, Sasse MA, Hailes SMV. Bringing security home: a process for developing secure and usable systems. In: Proceedings of the 2003 new security paradigms workshop. ACM; 2003. p. 49–57.
den Braber F, Hogganvik I, Lund MS, Stølen K, Vraalsen F. Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technol J. 2007;25(1):101–17.
Maughan D. The need for a national cybersecurity research and development agenda. Commun ACM. 2010;53(2):29–31.
Institute for Information Infrastructure Protection. Report: 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop; 2011. http://www.thei3p.org/events/sausage2011.html.
National Cyber Security Centre. Developers need help too; 2016. https://www.ncsc.gov.uk/blog-post/developers-need-help-too.
SINTEF. Fifth International Workshop on Secure Software Engineering; 2011. http://www.sintef.no/secse.
University CM. Symposium On Usable Privacy and Security; 2011. http://cups.cs.cmu.edu/soups.
Design, 6. a. OED Online. Oxford University Press; 2010. http://dictionary.oed.com/cgi/entry/50061846.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Faily, S. (2018). Why Designing for Usability and Security is Hard. In: Designing Usable and Secure Software with IRIS and CAIRIS. Springer, Cham. https://doi.org/10.1007/978-3-319-75493-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-75493-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75492-5
Online ISBN: 978-3-319-75493-2
eBook Packages: Computer ScienceComputer Science (R0)