In search of usable security: five lessons from the field
- 8 October 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Security & Privacy
- Vol. 2 (5) , 19-24
- https://doi.org/10.1109/msp.2004.71
Abstract
A new system reduces the time to enroll in a secure wireless network by two orders of magnitude, and it also gets high marks for usability and user satisfaction. This article provides a real-world example revealing five general lessons for usable, secure system design.Keywords
This publication has 5 references indexed in Scilit:
- Usable access control for the world wide webPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Using speakeasy for ad hoc peer-to-peer collaborationPublished by Association for Computing Machinery (ACM) ,2002
- Moving from the design of usable security technologies to the design of useful secure applicationsPublished by Association for Computing Machinery (ACM) ,2002
- Users are not the enemyCommunications of the ACM, 1999
- The protection of information in computer systemsProceedings of the IEEE, 1975