Advertisement

The Convergence of Security and Usability: Defining a Framework for Mobile Design

  • Ann-Marie Horcher
  • Gurvirender Tejay
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 373)

Abstract

Security and usability have traditionally been at odds in the design process [1]. In spite of this, the usability of security is widely recognized as a key component of security effectiveness[2-4] Design principles for good security have been designed by security experts [5]. Similarly principles for designed usability have also been created by usability experts [6-8]. In both cases the design principles were defined for the traditional workstation environment, instead of the mobile environment. This study examines both security and usability design principles for conflict or convergence, specifically in relation to a mobile environment. The resulting framework of combined security-usability principles identifies which design principles are critical for success in the mobile environment.

Keywords

usability security mobile devices design principles 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Braz, C., Robert, J.-M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, ACM, Montreal (2006)Google Scholar
  2. 2.
    Theofanos, M.F., Pfleeger, S.L.: Shouldn’t All Security Be Usable? IEEE Security & Privacy 9(2), 12–17 (2011)CrossRefGoogle Scholar
  3. 3.
    Cranor, L.F., Garfinkel, S.L.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly and Assoc. (2005)Google Scholar
  4. 4.
    Ka-Ping, Y.: Aligning security and usability. IEEE Security & Privacy 2(5), 48–55 (2004)CrossRefGoogle Scholar
  5. 5.
    Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)CrossRefGoogle Scholar
  6. 6.
    Nielsen, J.: Traditional dialogue design applied to modern user interfaces. Communications of the ACM 33(10), 109–118 (1990)CrossRefGoogle Scholar
  7. 7.
    Shneiderman, B., et al.: Designing the user interface: Strategies for effective human-computer interaction, 5th edn. Addison-Wesley, Reading (2009)Google Scholar
  8. 8.
    Norman, D.A.: THE WAY I SEE IT: Systems thinking: a product is more than the product. Interactions 16(5), 52–54 (2009)CrossRefGoogle Scholar
  9. 9.
    Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems Applications, vol. 38, pp. 43–48 (2010)Google Scholar
  10. 10.
    Rahmati, A., Zhong, L.: Human-battery interaction on mobile phones. Pervasive and Mobile Computing 5(5), 465–477 (2009)CrossRefGoogle Scholar
  11. 11.
    Kirk, C.P., Chiagouris, L., Gopalakrishna, P.: Some people just want to read: The roles of age, interactivity, and perceived usefulness of print in the consumption of digital information products. Journal of Retailing and Consumer Services (2011)Google Scholar
  12. 12.
    Kim, E., Lee, B., Menon, N.M.: Social welfare implications of the digital divide. Government Information Quarterly 26(2), 377–386 (2009)CrossRefGoogle Scholar
  13. 13.
    Myers, B.A.: Using handhelds for wireless remote control of PCs and appliances. Interacting with Computers 17(3), 251–264 (2005)CrossRefGoogle Scholar
  14. 14.
    West, J., Mace, M.: Browsing as the killer app: Explaining the rapid success of Apple’s iPhone. Telecommunications Policy 34(5-6), 270–286 (2009)CrossRefGoogle Scholar
  15. 15.
    Brenner, S.W.: History of computer crime. In: De Karl, L., Jan, B. (eds.) The History of Information Security, pp. 705–721. Elsevier Science B.V., Amsterdam (2007)CrossRefGoogle Scholar
  16. 16.
    Lawton, G.: Web 2.0 Creates Security Challenges. Computer 40(10), 13–16 (2007)CrossRefGoogle Scholar
  17. 17.
    Salerno, S., Sanzgiri, A., Upadhyaya, S.: Exploration of Attacks on Current Generation Smartphones. Procedia Computer Science 5(0), 546–553 (2011)CrossRefGoogle Scholar
  18. 18.
    Green, A.: Management of security policies for mobile devices. In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, pp. 1–4 (2007)Google Scholar
  19. 19.
    Yuan, Y., et al.: Identifying the ideal fit between mobile work and mobile work support. Information & Management (2010) (in Press, corrected proof)Google Scholar
  20. 20.
    Mittal, A., Sengupta, A.: Improvised layout of keypad entry system for mobile phones. Computer Standards & Interfaces 31(4), 693–698 (2009)CrossRefGoogle Scholar
  21. 21.
    Shih, H.-C., Wang, K.: An adaptive hybrid dynamic power management algorithm for mobile devices. Computer Networks (2011)Google Scholar
  22. 22.
    Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Computers & Security 28(6), 476–490 (2009)CrossRefGoogle Scholar
  23. 23.
    Faily, S., Flechais, I.: To boldly go where invention isn’t secure: applying security entrepreneurship to secure systems design. In: Proceedings of the 2010 Workshop on New Security Paradigms, pp. 73–84 (2010)Google Scholar
  24. 24.
    Garfinkel, S.L.: Design principles and patterns for computer systems that are simultaneously secure and usable, p. 1. Massachusetts Institute of Technology (2005)Google Scholar
  25. 25.
    Hertzum, M., Clemmensen, T.: How do usability professionals construe usability? International Journal of Human-Computer Studies 70(1), 26–42 (2012)CrossRefGoogle Scholar
  26. 26.
    Botha, R.A., Furnell, S.M., Clarke, N.L.: From desktop to mobile: Examining the security experience. Computers & Security 28(3-4), 130–137 (2008)CrossRefGoogle Scholar
  27. 27.
    Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Security in Ad Hoc Networks: From Vulnerability to Risk Management. In: Proceedings of 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 203–209 (2009)Google Scholar
  28. 28.
    Economides, A.A., Grousopoulou, A.: Students’ thoughts about the importance and costs of their mobile devices’ features and services. Telematics and Informatics 26(1), 57–84 (2009)CrossRefGoogle Scholar
  29. 29.
    Haverila, M.: What do we want specifically from the cell phone? An age related study. Telematics and Informatics (2011) (in Press, corrected proof)Google Scholar
  30. 30.
    Churchill, D., Hedberg, J.: Learning object design considerations for small-screen handheld devices. Computers & Education 50(3), 881–893 (2008)CrossRefGoogle Scholar
  31. 31.
    McGibbon, T., et al.: Use of Mobile Technology for Information Collection and Dissemination (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ann-Marie Horcher
    • 1
  • Gurvirender Tejay
    • 1
  1. 1.Nova Southeastern UniversityUSA

Personalised recommendations