Abstract
Security and usability have traditionally been at odds in the design process [1]. In spite of this, the usability of security is widely recognized as a key component of security effectiveness[2-4] Design principles for good security have been designed by security experts [5]. Similarly principles for designed usability have also been created by usability experts [6-8]. In both cases the design principles were defined for the traditional workstation environment, instead of the mobile environment. This study examines both security and usability design principles for conflict or convergence, specifically in relation to a mobile environment. The resulting framework of combined security-usability principles identifies which design principles are critical for success in the mobile environment.
Chapter PDF
Similar content being viewed by others
References
Braz, C., Robert, J.-M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conference of the Association Francophone d’Interaction Homme-Machine, ACM, Montreal (2006)
Theofanos, M.F., Pfleeger, S.L.: Shouldn’t All Security Be Usable? IEEE Security & Privacy 9(2), 12–17 (2011)
Cranor, L.F., Garfinkel, S.L.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly and Assoc. (2005)
Ka-Ping, Y.: Aligning security and usability. IEEE Security & Privacy 2(5), 48–55 (2004)
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)
Nielsen, J.: Traditional dialogue design applied to modern user interfaces. Communications of the ACM 33(10), 109–118 (1990)
Shneiderman, B., et al.: Designing the user interface: Strategies for effective human-computer interaction, 5th edn. Addison-Wesley, Reading (2009)
Norman, D.A.: THE WAY I SEE IT: Systems thinking: a product is more than the product. Interactions 16(5), 52–54 (2009)
Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems Applications, vol. 38, pp. 43–48 (2010)
Rahmati, A., Zhong, L.: Human-battery interaction on mobile phones. Pervasive and Mobile Computing 5(5), 465–477 (2009)
Kirk, C.P., Chiagouris, L., Gopalakrishna, P.: Some people just want to read: The roles of age, interactivity, and perceived usefulness of print in the consumption of digital information products. Journal of Retailing and Consumer Services (2011)
Kim, E., Lee, B., Menon, N.M.: Social welfare implications of the digital divide. Government Information Quarterly 26(2), 377–386 (2009)
Myers, B.A.: Using handhelds for wireless remote control of PCs and appliances. Interacting with Computers 17(3), 251–264 (2005)
West, J., Mace, M.: Browsing as the killer app: Explaining the rapid success of Apple’s iPhone. Telecommunications Policy 34(5-6), 270–286 (2009)
Brenner, S.W.: History of computer crime. In: De Karl, L., Jan, B. (eds.) The History of Information Security, pp. 705–721. Elsevier Science B.V., Amsterdam (2007)
Lawton, G.: Web 2.0 Creates Security Challenges. Computer 40(10), 13–16 (2007)
Salerno, S., Sanzgiri, A., Upadhyaya, S.: Exploration of Attacks on Current Generation Smartphones. Procedia Computer Science 5(0), 546–553 (2011)
Green, A.: Management of security policies for mobile devices. In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development, pp. 1–4 (2007)
Yuan, Y., et al.: Identifying the ideal fit between mobile work and mobile work support. Information & Management (2010) (in Press, corrected proof)
Mittal, A., Sengupta, A.: Improvised layout of keypad entry system for mobile phones. Computer Standards & Interfaces 31(4), 693–698 (2009)
Shih, H.-C., Wang, K.: An adaptive hybrid dynamic power management algorithm for mobile devices. Computer Networks (2011)
Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Computers & Security 28(6), 476–490 (2009)
Faily, S., Flechais, I.: To boldly go where invention isn’t secure: applying security entrepreneurship to secure systems design. In: Proceedings of the 2010 Workshop on New Security Paradigms, pp. 73–84 (2010)
Garfinkel, S.L.: Design principles and patterns for computer systems that are simultaneously secure and usable, p. 1. Massachusetts Institute of Technology (2005)
Hertzum, M., Clemmensen, T.: How do usability professionals construe usability? International Journal of Human-Computer Studies 70(1), 26–42 (2012)
Botha, R.A., Furnell, S.M., Clarke, N.L.: From desktop to mobile: Examining the security experience. Computers & Security 28(3-4), 130–137 (2008)
Azer, M.A., El-Kassas, S.M., El-Soudani, M.S.: Security in Ad Hoc Networks: From Vulnerability to Risk Management. In: Proceedings of 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 203–209 (2009)
Economides, A.A., Grousopoulou, A.: Students’ thoughts about the importance and costs of their mobile devices’ features and services. Telematics and Informatics 26(1), 57–84 (2009)
Haverila, M.: What do we want specifically from the cell phone? An age related study. Telematics and Informatics (2011) (in Press, corrected proof)
Churchill, D., Hedberg, J.: Learning object design considerations for small-screen handheld devices. Computers & Education 50(3), 881–893 (2008)
McGibbon, T., et al.: Use of Mobile Technology for Information Collection and Dissemination (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Horcher, AM., Tejay, G. (2013). The Convergence of Security and Usability: Defining a Framework for Mobile Design. In: Stephanidis, C. (eds) HCI International 2013 - Posters’ Extended Abstracts. HCI 2013. Communications in Computer and Information Science, vol 373. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39473-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-39473-7_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39472-0
Online ISBN: 978-3-642-39473-7
eBook Packages: Computer ScienceComputer Science (R0)