Usability challenges in security and privacy policy-authoring interfaces

被引:0
|
作者
Reeder, Robert W. [1 ]
Karat, Clare-Marie [2 ]
Karat, John [2 ]
Brodie, Carolyn [2 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] IBM Corp, T J Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
policy; policy-authoring; privacy; security; usability;
D O I
暂无
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of authoring methods has received limited treatment from usability experts. With the rise in networked applications, distributed data storage, and pervasive computing, authoring comprehensive and accurate policies is increasingly important, and is in creasingly performed by relatively novice and occasional users. Thus, the need for highly usable policy-authoring interfaces across a variety of policy domains is growing. This paper presents a definition of the security and privacy policy-authoring task in general and presents the results of a user study intended to discover some usability challenges that policy authoring presents. The user study employed SPARCLE, an enterprise privacy policy-authoring application. The usability challenges found include supporting object grouping, enforcing consistent terminology, making default policy rules clear, communicating and enforcing rule structure, and preventing rule conflicts. Implications for the design of SPARCLE and of user interfaces in other policy-authoring domains are discussed.
引用
收藏
页码:141 / +
页数:3
相关论文
共 50 条
  • [41] Security and Privacy Challenges for Healthcare: Minitrack Overview
    Plachkinova, Miloslava
    Grispos, George
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 3636 - 3637
  • [42] Security and Privacy for the Internet of Drones: Challenges and Solutions
    Lin, Chao
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    Vinel, Alexey
    Huang, Xinyi
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 64 - 69
  • [43] Editorial: Security and Privacy Challenges in Internet of Things
    Wang, Ding
    Meng, Weizhi
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 343 - 345
  • [44] Security and privacy challenges in open and dynamic environments
    Kagal, Lalana
    Finin, Tim
    Joshi, Anupam
    Greenspan, Sol
    COMPUTER, 2006, 39 (06) : 89 - 91
  • [45] Database as a Service: Challenges and Solutions for Privacy and Security
    Ferrari, Elena
    2009 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE (APSCC 2009), 2009, : 42 - 47
  • [46] Security and Privacy in Smart Cities: Challenges and Opportunities
    Cui, Lei
    Xie, Gang
    Qu, Youyang
    Gao, Longxiang
    Yang, Yunyun
    IEEE ACCESS, 2018, 6 : 46134 - 46145
  • [47] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184
  • [48] Security and Privacy Challenges in Industrial Internet of Things
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    Waidner, Michael
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [49] Security and Privacy in VANET : Concepts, Solutions and Challenges
    Krishnan, Remya P.
    Kumar, Arun Raj P.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 789 - 794
  • [50] Security and privacy in the Internet of Things: threats and challenges
    Badr, Youakim
    Zhu, Xiaoyang
    Alraja, Mansour Naser
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (04) : 257 - 271