Usability challenges in security and privacy policy-authoring interfaces

被引:0
|
作者
Reeder, Robert W. [1 ]
Karat, Clare-Marie [2 ]
Karat, John [2 ]
Brodie, Carolyn [2 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IBM Corp, T J Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
policy; policy-authoring; privacy; security; usability;
D O I
暂无
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of authoring methods has received limited treatment from usability experts. With the rise in networked applications, distributed data storage, and pervasive computing, authoring comprehensive and accurate policies is increasingly important, and is in creasingly performed by relatively novice and occasional users. Thus, the need for highly usable policy-authoring interfaces across a variety of policy domains is growing. This paper presents a definition of the security and privacy policy-authoring task in general and presents the results of a user study intended to discover some usability challenges that policy authoring presents. The user study employed SPARCLE, an enterprise privacy policy-authoring application. The usability challenges found include supporting object grouping, enforcing consistent terminology, making default policy rules clear, communicating and enforcing rule structure, and preventing rule conflicts. Implications for the design of SPARCLE and of user interfaces in other policy-authoring domains are discussed.
引用
收藏
页码:141 / +
页数:3
相关论文
共 50 条
  • [21] IoT Privacy and Security: Challenges and Solutions
    Tawalbeh, Lo'ai
    Muheidat, Fadi
    Tawalbeh, Mais
    Quwaider, Muhannad
    APPLIED SCIENCES-BASEL, 2020, 10 (12):
  • [22] Privacy and security challenges for autonomous agents
    Bistrom, Dennis
    Westerlund, Magnus
    Duncan, Bob
    Jaatun, Martin Gilje
    2022 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2022), 2022, : 230 - 237
  • [23] HbbTV Security and Privacy: Issues and Challenges
    Ghiglieri, Marco
    Waidner, Michael
    IEEE SECURITY & PRIVACY, 2016, 14 (03) : 61 - 67
  • [24] Security and Privacy in Fog Computing: Challenges
    Mukherjee, Mithun
    Matam, Rakesh
    Shu, Lei
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Choudhury, Nikumani
    Kumar, Vikas
    IEEE ACCESS, 2017, 5 : 19293 - 19304
  • [25] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [26] Policy framework for security and privacy management
    Karat, J.
    Karat, C. -M.
    Bertino, E.
    Li, N.
    Ni, Q.
    Brodie, C.
    Lobo, J.
    Calo, S. B.
    Cranor, L. F.
    Kumaraguru, P.
    Reeder, R. W.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [27] Security, Privacy, Policy, and Dependability Roundup
    Garber, Lee
    Garber, Lee, 1600, Institute of Electrical and Electronics Engineers Inc. (12): : 8 - 10
  • [28] Security, privacy, policy, and dependability roundup
    Garber, L., 1600, Institute of Electrical and Electronics Engineers Inc., United States (11):
  • [29] The role of security, privacy, usability and reputation in the development of online banking
    Casalo, Luis V.
    Flavian, Carlos
    Guinaliu, Miguel
    ONLINE INFORMATION REVIEW, 2007, 31 (05) : 583 - 603
  • [30] Exploring the Usability, Security and Privacy Taxonomy for Mobile Health Applications
    Asaddok, Norhidayah
    Ghazali, Masitah
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,