HCI and security

XIII.3 May + June 2006
Page: 28
Digital Citation

Designing an evaluation method for security user interfaces


Authors:
Cynthia Kuo, Adrian Perrig, Jesse Walker

Ten or 20 years ago, evaluating security products was not as much of a problem as it is today. Systems were managed by people able—and willing—to master the complexities. However, with the proliferation of personal computing devices and network connectivity in the home, systems are now regularly managed by nonexperts. Each system needs to be secured by each user in each home. Therefore designing effective, unbiased evaluation methods for consumer products is one of the first steps in improving both users' experiences and their security practices. Evaluating the usability of security is a challenge. A common question evaluators face…




You must be a member of SIGCHI, a subscriber to ACMs Digital Library, or an interactions subscriber to read the full text of this article.

LOG IN TO READ THE FULL ARTICLE

Forgot Password?

GET ACCESS

Join ACM SIGCHI

In addition to all of the professional benefits of being a SIGCHI member, members get full access to interactions online content and receive the print version of the magazine bimonthly.


Subscribe to the ACM Digital Library

Get access to all interactions content online and the entire archive of ACM publications dating back to 1954. (Please check with your institution to see if it already has a subscription.)


Subscribe to interactions

Get full access to interactions online content and receive the print version of the magazine bimonthly.


Post Comment


No Comments Found