Abstract
To design a user interface of a secure interactive application, a method is provided to designers with guidance in designing an adequate security information feedback using a library of user-interface design patterns integrating security and usability. The resulting feedback is then evaluated against a set of design/evaluation criteria called human–computer interaction for security (HCI-S). In this way, notifications combining visual and auditive channels required to achieve an effective feedback in case of a security issue are explicitly incorporated in the development life cycle.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atoyan, H., Duquet, J., Robert, J.: Trust in New Decision Aid Systems. In: Proc. of the 18th Int. Conf. of the Association Francophone d’Interaction Homme-Machine IHM’2006 (Montreal, April 18–21, 2006). ACM Press, New York (2006) 115–122.
Berry, B., Hobby, L. D., McCrickard, S., North, C., Pérez-Quiñones, M. A.: Making a Case for HCI: Exploring Benefits of Visualization for Case Studies. In: Proc. of World Conf. on Educ. Multimedia, Hypermedia & Telecom. EDMEDIA’2006 (Orlando, June 26–30, 2006).
Braz, C., Seffah, A., M’Raihi, D.: Designing a Trade-off Between Usability and Security: A Metrics Based-Model. In: Proc. of 11th IFIP TC 13 Conf. on Human–Computer Interaction INTERACT’2007 (Rio de Janeiro, September 10–14, 2007). Lecture Notes in Computer Science, Vol. 4663. Springer, Berlin (2007) 114–126
Lee, J.C., McCrickard, S.: Towards Extreme(ly) Usable Software: Exploring Tensions Between Usability and Agile Software Development. In: Proc. of Agile Conference AGILE’2007 (Washington, DC, August 13–17, 2007). IEEE Comp. Soc. Press (2007) 59–71.
Cranor, L.F.: Designing a Privacy Preference Specification Interface: A Case Study. In: Proc. of ACM CHI’2003 Workshop on Human–Computer Interaction and Security Systems (Fort Lauderdale, April 5–10, 2003). ACM Press, New York (2003).
Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly, Sebastopol (2005).
DARPA Intrusion Detection Evaluation: Data Sets, Massachusetts Institute of Technology, Lincoln Laboratory, Boston (1999). Accessible at http://www.ll.mit.edu/IST/ideval/data/1998/1998_data_index.html.
Dass, M.: LIDS: A Learning Intrusion Detection System. B.E. Thesis. Nagpur University, Nagpur (2000).
Dhamija, R.: Security Usability Studies: Risk, Roles and Ethics. In: Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, April 28 – May 3, 2007). ACM Press, New York (2007).
D’Hertefelt, S.: Trust and the Perception of Security, 2000. Accessible at http://www.interactionarchitect.com/research/report20000103shd.htm.
Dustin, E., Rasca, J., McDiarmid, D.: Quality Web Systems: Performance, Security, and Usability. Addison-Wesley, New York (2001).
García-Ruiz, M., Vargas Martin, M., Kapralos, B.: Towards Multimodal Interfaces for Intrusion Detection. In: Audio Eng. Society: Pro Audio Expo and Convention (Vienna, 2007).
Hewett, T., Baecker, R., Card, S., Carey, T., Gasen, J., Mantei, M., Perlman, G., Strong, G., Verplank, W.: ACM SIGCHI Curricula for Human–Computer Interaction. ACM, New York (2004). Accessible at http://www.acm.org/sigchi/cdg/cdg2.html.
Johnson, M.L., Zurko, M.E.: Security User Studies and Standards: Creating Best Practices. In: Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, April 28 – May 3, 2007). ACM Press, New York (2007).
Johnston, J., Eloff, J., Labuschagne, L.: Security and Human Computer Interfaces. Comput Security 22, 8 (2003) 675–684.
Ka-Ping, Y.: Secure Interaction Design and the Principle of Least Authority. In: Proc. of ACM CHI’2003 Workshop on Human-Computer Interaction and Security Systems (Fort Lauderdale, April 5–10, 2003). ACM Press, New York (2003).
McCrickard, S., Czerwinski, M., Bartramc, L.: Introduction: Design and Evaluation of Notification User Interfaces. Int J Hum Comput Stud 58 (2003) 509–514.
Nielsen, J.: Ten Usability Heuristics. Nielsen & Norman Group, Mountain View (2005). Accessible at http://www.useit.com/papers/heuristic/heuristic_list.html .
Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability Challenges in Security and Privacy Policy-Authoring Interfaces. In: Proc. of 11th IFIP TC 13 Conf. on Human–Computer Interaction INTERACT’2007. LNCS, Vol. 4663. Springer, Berlin (2007) 141–155.
Rode, J., Johansson, C., DiGioia, P., Silva Filho, R., Nies, K., Nguyen, D. H., Ren, J., Dourish, P., Redmiles, D.: Seeing Further: Extending Visualization as a Basis for Usable Security. In: Proc. of Second ACM Symposium on Usable Privacy and Security SOUPS’2006 (Pittsburgh, July 12–14, 2006). ACM Press, New York (2006) 145–155.
Roth, V., Turner, T.: User Studies on Security: Good vs. Perfect. In: Proc. of ACM CHI’2007 Workshop on Security User Studies (San Jose, April 28 – May 3, 2007). ACM Press, New York (2007).
Yurcik, W., Barlow, J., Lakkaraju, K., Haberman, M.: Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements. In: Proc. of ACM CHI’2003 Workshop on Human–Computer Interaction and Security Systems (Fort Lauderdale, April 5–10, 2003). ACM Press, New York (2003).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this paper
Cite this paper
Muñoz-Arteaga, J., González, R., Martin, M., Vanderdonckt, J., Álvarez-Rodriguez, F., Calleros, J. (2009). A Method to Design Information Security Feedback Using Patterns and HCI-Security Criteria. In: Lopez Jaquero, V., Montero Simarro, F., Molina Masso, J., Vanderdonckt, J. (eds) Computer-Aided Design of User Interfaces VI. Springer, London. https://doi.org/10.1007/978-1-84882-206-1_26
Download citation
DOI: https://doi.org/10.1007/978-1-84882-206-1_26
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84882-205-4
Online ISBN: 978-1-84882-206-1
eBook Packages: Computer ScienceComputer Science (R0)