Exploring user-centered security design for usable authentication ceremonies

19Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security technology often follows a systems design approach that focuses on components instead of users. As a result, the users' needs and values are not sufciently addressed, which has implications on security usability. In this paper, we report our lessons learned from applying a user-centered security design process to a wellunderstood security usability challenge, namely key authentication in secure instant messaging. Users rarely perform these key authentication ceremonies, which makes their end-to-end encrypted communication vulnerable. Our approach includes collaborative design workshops, an expert evaluation, iterative storyboard prototyping, and an online evaluation. While we could not demonstrate that our design approach resulted in improved usability or user experience, we found that user-centered prototypes can increase the users' comprehension of security implications. Hence, prototypes based on users' intuitions, needs, and values are useful starting points for approaching long-standing security challenges. Applying complementary design approaches may improve usability and user experience further.

Cite

CITATION STYLE

APA

Fassl, M., Grober, L., & Krombholz, K. (2021). Exploring user-centered security design for usable authentication ceremonies. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery. https://doi.org/10.1145/3411764.3445164

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free