Shamal Faily
Editor
Proceedings of the Designing interactive secure systems workshop (DISS 2012).
Contributors
Ivan Fl�chais
Editor
Lizzie Coles-Kemp
Editor
Abstract
In recent years, the field of usable security has attracted researchers from HCI and Information Security, and led to a better understanding of the interplay between human factors and security mechanisms. Despite these advances, designing systems which are both secure in, and appropriate for, their contexts of use continues to frustrate both researchers and practitioners. One reason is a misunderstanding of the role that HCI can play in the design of secure systems. A number of eminent security researchers and practitioners continue to espouse the need to treat people as the weakest link, and encourage designers to build systems that Homer Simpson can use. Unfortunately, treating users as a problem can limit the opportunities for innovation when people are engaged as part of a solution. Similarly, while extreme characters (such as Homer) can be useful for envisaging different modes of interaction, when taken out of context they risk disenfranchising the very people the design is meant to support. Better understanding the relationship between human factors and the design of secure systems is an important step forward, but many design research challenges still remain. There is growing evidence that HCI design artefacts can be effective at supporting secure system design, and that some alignment exists between HCI, security, and software engineering activities. However, more is needed to understand how broader insights from the interactive system design and user experience communities might also find traction in secure design practice. For these insights to lead to design practice innovation, we also need usability and security evaluation activities that better support interaction design, together with software tools that augment, rather than hinder, these design processes. Last, but not least, we need to share experiences and anecdotes about designing usable and secure systems, and reflect on the different ways of performing and evaluating secure interaction design research. The objective of this workshop is to act as a forum for those interested in the design of interactive secure systems. By bringing together a like-minded community of researchers and practitioners, we hope to share knowledge gleaned from recent research, as well as experiences designing secure and usable systems in practice.
Citation
FAILY, S., FLÉCHAIS, I. and COLES-KEMP, L. (eds.) 2012. Proceedings of the Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers, 11 September 2012, Birmingham, UK. Swindon: BCS [online], article numbers 62-70. Preface available from: https://doi.org/10.14236/ewic/HCI2012.70
Conference Name | Designing interactive secure systems workshop (DISS 2012), part of the 26th International BCS human computer interaction conference (HCI 2012): people and computers |
---|---|
Conference Location | Birmingham, UK |
Start Date | Sep 11, 2012 |
Acceptance Date | Sep 11, 2012 |
Online Publication Date | Sep 30, 2012 |
Publication Date | Sep 30, 2012 |
Deposit Date | Dec 9, 2021 |
Publicly Available Date | Dec 9, 2021 |
Publisher | BCS, The Chartered Institute for IT |
Series Title | Electronic workshops in computing |
Series ISSN | 1477-9358 |
DOI | https://doi.org/10.14236/ewic/HCI2012.70 |
Keywords | Systems security; User-centred design; Human-computer interaction (HCI); Software engineering |
Public URL | https://rgu-repository.worktribe.com/output/1446739 |
Related Public URLs | (Individual papers) https://rgu-repository.worktribe.com/output/1446694 |
Files
FAILY 2012 Proceedings of DISS 2012
(3.2 Mb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by/4.0/
Related Outputs
Secure system? Challenge accepted: finding and resolving security failures using security premortems.
(2012)
Conference Proceeding
Software for interactive secure systems design: lessons learned developing and applying CAIRIS.
(2012)
Conference Proceeding
You might also like
Programming language evaluation criteria for safety-critical software in the air domain.
(2022)
Conference Proceeding
Privacy goals for the data lifecycle.
(2022)
Journal Article
Automation and cyber security risks on the railways: the human factors implications.
(2022)
Presentation / Conference
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Integrated design framework for facilitating systems-theoretic process analysis.
(2022)
Conference Proceeding
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search