Shamal Faily
Finding and resolving security misusability with misusability cases.
Faily, Shamal; Fl�chais, Ivan
Authors
Ivan Fl�chais
Abstract
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems subsequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illustrating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems.
Citation
FAILY, S. and FLÉCHAIS, I. 2016. Finding and resolving security misusability with misusability cases. Requirements engineering [online], 21(2), pages 209-223. Available from: https://doi.org/10.1007/s00766-014-0217-8
Journal Article Type | Article |
---|---|
Acceptance Date | Nov 25, 2014 |
Online Publication Date | Dec 2, 2014 |
Publication Date | Jun 30, 2016 |
Deposit Date | Sep 29, 2021 |
Publicly Available Date | Mar 28, 2024 |
Journal | Requirements engineering |
Print ISSN | 0947-3602 |
Electronic ISSN | 1432-010X |
Publisher | Springer |
Peer Reviewed | Peer Reviewed |
Volume | 21 |
Issue | 2 |
Pages | 209-223 |
DOI | https://doi.org/10.1007/s00766-014-0217-8 |
Keywords | Systems security; User-centred design; Software engineering; Requirements engineering |
Public URL | https://rgu-repository.worktribe.com/output/1446649 |
Files
FAILY 2016 Finding and resolving security misusability
(1.4 Mb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by/4.0/
You might also like
Programming language evaluation criteria for safety-critical software in the air domain.
(2022)
Conference Proceeding
Privacy goals for the data lifecycle.
(2022)
Journal Article
Automation and cyber security risks on the railways: the human factors implications.
(2022)
Presentation / Conference
Integrated design framework for facilitating systems-theoretic process analysis.
(2022)
Conference Proceeding
Cybersecurity user requirements analysis: the ECHO approach.
(2022)
Conference Proceeding
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search