Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration 2010
DOI: 10.1145/1866898.1866907
|View full text |Cite
|
Sign up to set email alerts
|

It's too complicated, so i turned it off!

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…In planning the data analysis, we followed the guidelines of qualitative analysis for processing data from interviews. 54 Moreover, we looked at existing reports based on interviews in the cybersecurity or software engineering domain, like earlier studies 49,52 to validate our approach.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In planning the data analysis, we followed the guidelines of qualitative analysis for processing data from interviews. 54 Moreover, we looked at existing reports based on interviews in the cybersecurity or software engineering domain, like earlier studies 49,52 to validate our approach.…”
Section: Discussionmentioning
confidence: 99%
“…A good example is a set of semistructured interviews focused on personal firewalls. 52 Notably, the interviews were conducted with a wide range of participants with different knowledge about security to explore the common expectations, perceptions, and misconceptions. Interviews have also been utilized to validate the cybersecurity visualization model, which is itself also based on a qualitative approach.…”
Section: Interviews and Surveys In Software Engineering And Digital F...mentioning
confidence: 99%
See 1 more Smart Citation
“…Many a time, users are overwhelmed with the restrictions imposed on them due to security features, consequently resorting to either turning it off or bypassing it, resulting in lessening the security 8,9 . Process improvement, productivity, and efficiency improvement also result from increased usability.…”
Section: Usable Securitymentioning
confidence: 99%
“…This is a typical dialog structure, similar to others that might signal the acceptance of terms and conditions, granting permission for a software download, or agreeing to mobile applications accessing information from a mobile device. We know that users habituate to such messages over time (i.e., the more frequently they see the message, the less attention they give them Böhme and Köpsell, 2010; Raja et al, 2010). Further, we know that dialog boxes often interrupt the user in achieving his or her primary goal.…”
Section: Introductionmentioning
confidence: 99%