2017
DOI: 10.1007/978-3-319-58460-7_6
|View full text |Cite
|
Sign up to set email alerts
|

A User-Centered Model for Usable Security and Privacy

Abstract: Security, privacy and usability are vital quality attributes of IT systems and services. Users and legal authorities demand that systems are secure and preserve privacy. At the same time, security and privacy mechanisms should not complicate workflows and must be transparent for the user. In order to master this challenge, a close involvement of the users is necessary - both at development and at run-time. In this paper, we present a user-centered model for usable security and privacy that is aligned with user… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(36 citation statements)
references
References 22 publications
0
36
0
Order By: Relevance
“…It concerns granular and usable information, as well as informed privacy protection decision support [20]. The active involvement of the user targets the user capability of building an individual mental model of the control mechanism and the preservation of privacy [21,22]. This model decides whether a user trusts or mistrusts a system.…”
Section: User Engagement and Self-determinationmentioning
confidence: 99%
“…It concerns granular and usable information, as well as informed privacy protection decision support [20]. The active involvement of the user targets the user capability of building an individual mental model of the control mechanism and the preservation of privacy [21,22]. This model decides whether a user trusts or mistrusts a system.…”
Section: User Engagement and Self-determinationmentioning
confidence: 99%
“…In this way, evaluators are supported by concrete, complementary information that support the evaluation of the heuristics. For a detailed description of the integration of our approach into HCD, please refer to [10]. In the following sections, we present the heuristics, the model, their combination and the tool support for our approach.…”
Section: Overall Approachmentioning
confidence: 99%
“…To simplify the handling and explanation, we divided the model into three (overlapping) perspectives: "System Security", "System and User Context", and "System Design", which are described in this chapter. A description of the integration in the human centered design process is described in [10].…”
Section: Usability and Security Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…However, manual rules do not scale and can be a burden to users in larger and more complex smart spaces. In this case, it is necessary to support fine-grained access control and user activity automation requirements in a transparent manner, [50] without explicit user input. Therefore, devices will be automat- ically selected based on their ability to fulfil a user activity, which is represented as a workflow of user activity function requirements.…”
Section: Introductionmentioning
confidence: 99%