2009
DOI: 10.1016/j.ijhcs.2007.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

Abstract: e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. On the one hand, the raison d'être of the projects is to encourage members of their research communities to use the resources provided. On the other hand, the threats to these resources from online attacks require robust and effective security to mitigate the risks faced. This raises two issues: ensuring that (1) the security mechanisms put in place… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 25 publications
(24 citation statements)
references
References 26 publications
0
24
0
Order By: Relevance
“…It is necessary to broaden the study of security issues to include not only the technical, but also the human and organizational dimensions [11]. A better understanding of real world conditions and constraints during the adoption of security practices would help developers and designers make secure systems more usable [3].…”
mentioning
confidence: 99%
“…It is necessary to broaden the study of security issues to include not only the technical, but also the human and organizational dimensions [11]. A better understanding of real world conditions and constraints during the adoption of security practices would help developers and designers make secure systems more usable [3].…”
mentioning
confidence: 99%
“…This entails making the assigned stakeholders liable for addressing the obstacle. Flechais and Sasse [31] argue that this motivates the assigned stakeholders. This is because failure to act responsibly damages both the project's assets and its reputation; this reputation loss may lead to loss of trust in the whole system.…”
Section: Scope and Responsibilitymentioning
confidence: 99%
“…Some participatory design researchers have extended the stakeholder base to include others whose participation is similar to that of the users. Flechais and Sasse [14] for instance in their study of design of usable security in e-Science included multiple stakeholders in their four case studies. Besides the end users and developers, they added owners of the systems, security experts and a data provider.…”
Section: Related Workmentioning
confidence: 99%