Skip to main content

Why Designing for Usability and Security is Hard

  • Chapter
  • First Online:

Abstract

In this chapter, I summarise the challenges that make designing for usability and security hard, and outline the structure of this book.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sellen A, Rogers Y, Harper R, Rodden T. Reflecting human values in the digital age. Commun ACM. 2009;52(3):58–66.

    Article  Google Scholar 

  2. Detica. The Cost of Cyber Crime: A Detics Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. UK Cabinet Office; 2011.

    Google Scholar 

  3. Nielsen J. Guerrilla HCI: using discount usability engineering to penetrate the intimidation barrier. In: Bias RG, Mayhew DJ, editors. Cost-justifying usability. Morgan Kaufmann; 1994. p. 242–272.

    Google Scholar 

  4. Schneier B. Secrets and lies : digital security in a networked world. John Wiley & Sons; 2000.

    Google Scholar 

  5. Swiderski F, Snyder W. Threat modeling. Microsoft Press; 2004.

    Google Scholar 

  6. Ghezzi C, Jazayeri M, Mandrioli D. Fundamentals of software engineering. 2nd ed. Prentice Hall; 2003.

    Google Scholar 

  7. ISO. ISO/IEC 13407: Human-Centered Design Processes for Interactive Systems. ISO/IEC; 1999.

    Google Scholar 

  8. Fléchais I, Sasse MA, Hailes SMV. Bringing security home: a process for developing secure and usable systems. In: Proceedings of the 2003 new security paradigms workshop. ACM; 2003. p. 49–57.

    Google Scholar 

  9. den Braber F, Hogganvik I, Lund MS, Stølen K, Vraalsen F. Model-based security analysis in seven steps - a guided tour to the CORAS method. BT Technol J. 2007;25(1):101–17.

    Article  Google Scholar 

  10. Maughan D. The need for a national cybersecurity research and development agenda. Commun ACM. 2010;53(2):29–31.

    Article  Google Scholar 

  11. Institute for Information Infrastructure Protection. Report: 1st Software and Usable Security Aligned for Good Engineering (SAUSAGE) Workshop; 2011. http://www.thei3p.org/events/sausage2011.html.

  12. National Cyber Security Centre. Developers need help too; 2016. https://www.ncsc.gov.uk/blog-post/developers-need-help-too.

  13. SINTEF. Fifth International Workshop on Secure Software Engineering; 2011. http://www.sintef.no/secse.

  14. University CM. Symposium On Usable Privacy and Security; 2011. http://cups.cs.cmu.edu/soups.

  15. Design, 6. a. OED Online. Oxford University Press; 2010. http://dictionary.oed.com/cgi/entry/50061846.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shamal Faily .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Faily, S. (2018). Why Designing for Usability and Security is Hard. In: Designing Usable and Secure Software with IRIS and CAIRIS. Springer, Cham. https://doi.org/10.1007/978-3-319-75493-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75493-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75492-5

  • Online ISBN: 978-3-319-75493-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics