2021
DOI: 10.1108/ics-10-2020-0167
|View full text |Cite
|
Sign up to set email alerts
|

Exploring the meaning of usable security – a literature review

Abstract: Purpose For decades, literature has reported on the perceived conflict between usability and security. This mutual trade-off needs to be considered and addressed whenever security products are developed. Achieving well-balanced levels of both is a precondition for sufficient security as users tend to reject unusable solutions. To assess it correctly, usability should be evaluated in the context of security. This paper aims to identify and describe universally applicable and solution-independent factors that af… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Over the past 20+ years, there has been increased emphasis on identification and reporting of known vulnerabilities in a national database (NVD) maintained by the NIST (NVD, Sengupta et al , 2011; Amankwa et al , 2022). However, past research has focused on the growth of vulnerabilities and focused on predicting the trends in growth patterns (Biswas and Mukhopadhyay, 2018; Scholte et al , 2012; Erola et al , 2022), while little focus is on remediation of vulnerabilities in an ERP environment, ignoring the gap in cybersecurity remediation between usability and security (Lennartsson et al , 2021).…”
Section: Methodsmentioning
confidence: 99%
“…Over the past 20+ years, there has been increased emphasis on identification and reporting of known vulnerabilities in a national database (NVD) maintained by the NIST (NVD, Sengupta et al , 2011; Amankwa et al , 2022). However, past research has focused on the growth of vulnerabilities and focused on predicting the trends in growth patterns (Biswas and Mukhopadhyay, 2018; Scholte et al , 2012; Erola et al , 2022), while little focus is on remediation of vulnerabilities in an ERP environment, ignoring the gap in cybersecurity remediation between usability and security (Lennartsson et al , 2021).…”
Section: Methodsmentioning
confidence: 99%
“…Despite this, we identified a few systematic reviews on the subject, although they primarily dig into more specific aspects over relatively brief periods [6,11,12].…”
Section: Rationalementioning
confidence: 99%
“…The field of usable security examines, amongst other aspects, how security is traded with usability; a review by Lennartsson et al finds that "Usability is hampered when users' primary tasks are disturbed." [30]. Further findings, that "Necessary security actions should be arranged in ways that minimize interruptions" and "compelling users to remember passwords repeatedly interrupts other tasks as enforced context switches may cause confusion" are of interest when viewing security implications of a VA -a tool that is, by design, friction-free in its use of a voice interface.…”
Section: Securitymentioning
confidence: 99%