Skip to main content

Helping Users Secure Their Data by Supporting Mental Models of VeraCrypt

  • Conference paper
  • First Online:
HCI International 2019 - Posters (HCII 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1032))

Included in the following conference series:

Abstract

VeraCrypt is a popular free and open source file encryption software that encrypts disks and partitions. It has known usability issues which limit its reach to a wider audience. One way of improving its usability is to better support user mental models by changing the functionality description. We did a Cognitive Walkthrough with usability experts to test VeraCrypt’s interface and the effectiveness of an attempt to help ease use through a mental model builder (MMB) in the form of a short instructional text. They concluded that the MMB would be helpful for users. We also conducted a user study to verify VeraCrypt’s usability and to test the MMB with users. Before the MMB, participants were asked to secure a file using VeraCrypt and none were successful. After our MMB, 4/5 participants were able to achieve at least one sub-task, with two successfully completing the entire task. However, the MMB was more successful with users with tech backgrounds, suggesting that a more detailed MMB would have been better for average users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brooke, J., et al.: SUS: a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4–7 (1996)

    Google Scholar 

  2. Gujrati, S., Vasserman, E.Y.: The usability of TrueCrypt, or how I learned to stop whining and fix an interface. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 83–94. ACM (2013)

    Google Scholar 

  3. Henry, A.: Most popular file encryption tool: VeraCrypt. https://lifehacker.com/five-best-file-encryption-tools-5677725/1685273934. Accessed 02 Oct 2018

  4. Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 1994, New York, NY, USA, pp. 152–158. ACM (1994)

    Google Scholar 

  5. Sauro, J.: A Practical Guide to the System Usability Scale: Background, Benchmarks & Best Practices. Measuring Usability LLC, Denver (2011)

    Google Scholar 

  6. Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol. 348 (1999)

    Google Scholar 

  7. Johnson-Laird, P.N.: Mental models and thought. In: Holyoak, K.J., Morrison, R.G. (eds.) The Cambridge Handbook of Thinking and Reasoning, pp. 185–208. Cambridge University Press, Cambridge (2005)

    Google Scholar 

  8. Petrie, H., Bevan, N.: The evaluation of accessibility, usability and user experience. In: Stepanidis, C. (ed.) The Universal Access Handbook, pp. 10–20. CRC Press, Boca Raton (2009)

    Google Scholar 

  9. Norman, D.A.: Some observations on mental models. In: Gentner, D., Stevens, A.L. (eds.) Mental Models, pp. 15–22. Psychology Press, London (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Milica Stojmenović .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Spero, E., Stojmenović, M., Biddle, R. (2019). Helping Users Secure Their Data by Supporting Mental Models of VeraCrypt. In: Stephanidis, C. (eds) HCI International 2019 - Posters. HCII 2019. Communications in Computer and Information Science, vol 1032. Springer, Cham. https://doi.org/10.1007/978-3-030-23522-2_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23522-2_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23521-5

  • Online ISBN: 978-3-030-23522-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics