2007
DOI: 10.1504/ijesdf.2007.013589
|View full text |Cite
|
Sign up to set email alerts
|

Integrating security and usability into the requirements and design process

Abstract: Security is a complex and important non-functional requirement of software systems. According to Ross Anderson, "Many systems fail because their designers protect the wrong things, or protect the right things in the wrong way" [Anderson, 2001]. Surveys [Department of Trade and Industry, 2004] also show that security incidents in industry are rising, which highlights the difficulty of designing good security. Some recent approaches have targeted security from the technological perspective, others from the huma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
48
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 73 publications
(48 citation statements)
references
References 15 publications
0
48
0
Order By: Relevance
“…To understand why, we should consider one example of follow-on work: the Appropriate and Effective Guidance for Information Security (AEGIS) design method [30]. AEGIS assumes that secure systems are not merely software systems, but socio-technical systems: systems of technology used within a system of activity.…”
Section: User-centred Security and Aegismentioning
confidence: 99%
“…To understand why, we should consider one example of follow-on work: the Appropriate and Effective Guidance for Information Security (AEGIS) design method [30]. AEGIS assumes that secure systems are not merely software systems, but socio-technical systems: systems of technology used within a system of activity.…”
Section: User-centred Security and Aegismentioning
confidence: 99%
“…Finally, security countermeasures are proposed based on these risks, cost and an assessment of their ease of use in the context of operation. More details can be found in [Flechais, Mascolo et al, 2006;Flechais, Sasse et al, 2003;Sasse & Flechais, 2005].…”
Section: Action Researchmentioning
confidence: 99%
“…Each workshop lasted between two and three hours, was recorded and transcribed in full. These interventions showed AEGIS to be a useful methodology and also provided useful feedback for improving the method (see [Flechais, Mascolo et al, 2006;Flechais, Sasse et al, 2003] for more details about the specific case studies).…”
Section: Research Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Users utilize passwords in everyday life to access their accounts and support their activities. Although user authentication is a topic well studied, the practice of using passwords as a means of providing identity is challenging security and usability design aspects (Flechais, Mascolo and Sasse, 2007) and can hinder situational awareness (Barford et al, 2009). Authentication controls such as password creation policies, try to balance between strong security (which dictates more diverse passwords that are not easily cracked) and usability of authentication mechanisms (relating to the ease of use and memorability of passwords).…”
Section: Introductionmentioning
confidence: 99%