User help techniques for usable security

Almut Herzog, N. Shahmehri
{"title":"User help techniques for usable security","authors":"Almut Herzog, N. Shahmehri","doi":"10.1145/1234772.1234787","DOIUrl":null,"url":null,"abstract":"There are a number of security-critical applications such as personal firewalls, web browsers and e-mail clients, whose users have little or no security knowledge and are easily confused, even frustrated by menus, messages or dialog boxes that deal with security issues.\n While there are evaluations of existing applications and proposals for new approaches or design guidelines for usable security applications, little effort has been invested in determining how applications can help users in security decisions and security tasks. The purpose of this work is to analyse conventional and security-specific user help techniques with regard to their usefulness in supporting lay users in security applications.\n We analyse the following help techniques: online documentation, context-sensitive help, wizards, assistants, safe staging and social navigation, and complement these with the tempting alternative of built-in, hidden security. Criteria for the analysis are derived from the type of user questions that can arise in applications and from definitions of when a security application can be called usable.\n Designers of security applications can use our analysis as general recommendations for when and how to use and combine user help techniques in security applications, but they can also use the analysis as a template. They can instantiate the template for their specific application to arrive at a concrete analysis of which user help techniques are most suitable in their specific case.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"28","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Human Interaction for Management of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1234772.1234787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 28

Abstract

There are a number of security-critical applications such as personal firewalls, web browsers and e-mail clients, whose users have little or no security knowledge and are easily confused, even frustrated by menus, messages or dialog boxes that deal with security issues. While there are evaluations of existing applications and proposals for new approaches or design guidelines for usable security applications, little effort has been invested in determining how applications can help users in security decisions and security tasks. The purpose of this work is to analyse conventional and security-specific user help techniques with regard to their usefulness in supporting lay users in security applications. We analyse the following help techniques: online documentation, context-sensitive help, wizards, assistants, safe staging and social navigation, and complement these with the tempting alternative of built-in, hidden security. Criteria for the analysis are derived from the type of user questions that can arise in applications and from definitions of when a security application can be called usable. Designers of security applications can use our analysis as general recommendations for when and how to use and combine user help techniques in security applications, but they can also use the analysis as a template. They can instantiate the template for their specific application to arrive at a concrete analysis of which user help techniques are most suitable in their specific case.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
可用安全性的用户帮助技术
有许多对安全至关重要的应用程序,如个人防火墙、web浏览器和电子邮件客户端,它们的用户很少或根本没有安全知识,很容易被处理安全问题的菜单、消息或对话框弄糊涂,甚至感到沮丧。虽然存在对现有应用程序的评估和对可用安全性应用程序的新方法或设计指南的建议,但在确定应用程序如何帮助用户进行安全性决策和安全性任务方面投入的努力很少。这项工作的目的是分析传统的和安全特定的用户帮助技术在支持非专业用户安全应用程序方面的有用性。我们分析了以下帮助技术:在线文档、上下文相关的帮助、向导、助手、安全staging和社交导航,并用内置的、隐藏的安全性这一诱人的替代方案来补充这些技术。分析的标准来自应用程序中可能出现的用户问题的类型,以及何时可以将安全应用程序称为可用的定义。安全应用程序的设计人员可以将我们的分析作为在安全应用程序中何时以及如何使用和组合用户帮助技术的一般建议,但他们也可以将分析用作模板。他们可以为他们的特定应用实例化模板,从而得出一个具体的分析,即哪些用户帮助技术最适合他们的特定情况。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
People frames: the social construction of information systems Principles for applying social navigation to collaborative systems Transparent collaboration: letting users simulate another user's world Towards a task oriented method for accessing network based services Johnny can drag and drop: determining user intent through traditional interactions to improve desktop security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1