Exploring User-Centered Security Design for Usable Authentication Ceremonies

被引:11
|
作者
Fassl, Matthias [1 ,2 ]
Grober, Lea Theresa [1 ,2 ]
Krombholz, Katharina [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Saarland Univ, Saarbrucken, Germany
关键词
Instant Messaging; Man-in-the-Middle (MitM); Authentication; Usability; User-Centered Design;
D O I
10.1145/3411764.3445164
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security technology often follows a systems design approach that focuses on components instead of users. As a result, the users' needs and values are not sufficiently addressed, which has implications on security usability. In this paper, we report our lessons learned from applying a user-centered security design process to a well-understood security usability challenge, namely key authentication in secure instant messaging. Users rarely perform these key authentication ceremonies, which makes their end-to-end encrypted communication vulnerable. Our approach includes collaborative design workshops, an expert evaluation, iterative storyboard prototyping, and an online evaluation. While we could not demonstrate that our design approach resulted in improved usability or user experience, we found that user-centered prototypes can increase the users' comprehension of security implications. Hence, prototypes based on users' intuitions, needs, and values are useful starting points for approaching long-standing security challenges. Applying complementary design approaches may improve usability and user experience further.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Evolving the Scope of User-Centered Design
    IBM T.J. Watson Research Center, Hawthorne, NY, United States
    Commun ACM, 7 (XII-38):
  • [32] User-centered design for productive systems
    Kubie, JJ
    Melkus, LA
    Johnson, RC
    Flanagan, GA
    INFORMATION SYSTEMS MANAGEMENT, 1996, 13 (02) : 38 - 48
  • [33] User-centered design at IBM consulting
    Ominsky, M
    Stern, KR
    Rudd, JR
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2002, 14 (3-4) : 349 - 368
  • [34] Defining a user-centered design process
    Rauch, TL
    Soderston, C
    Hill, GW
    STC 1996 PROCEEDINGS - 43RD ANNUAL CONFERENCE: EVOLUTION/REVOLUTION, 1996, : 341 - 344
  • [35] Experience in Remote User-Centered Design
    Haramundanis, Katherine
    SIGDOC'08: PROCEEDINGS OF THE 26TH ACM INTERNATIONAL CONFERENCE ON DESIGN OF COMMUNICATION, 2008, : 43 - 46
  • [36] Exploring Design Guidelines of Using User-Centered Design in Gamification Development: A Delphi Study
    Chen, Yang
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2019, 35 (13) : 1170 - 1181
  • [37] The elements of user experience: User-centered design for the Web
    Deaton, M
    TECHNICAL COMMUNICATION, 2003, 50 (04) : 631 - 633
  • [38] A GC user interface based on a user-centered design
    Herrick, K
    AMERICAN LABORATORY, 2003, 35 (22) : 28 - +
  • [39] User interface prototype for user-centered interface design
    Lee, Chang-Mog
    Kim, Jeong-Ok
    Chang, Ok-Bae
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 622 - +
  • [40] User-centered security: Stepping up to the grand challenge
    Zurko, ME
    21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 166 - 179