Abstract
In the movie “Life is Beautiful”, Guido Orefice, the character interpreted by Roberto Benigni, convinces his son Giosuè that they have been interned in a nazi concentration camp not because they are Jews but because they are actually taking part in a long and complex game in which they, and in particular Giosuè, must perform the tasks that the guards give them. A ghastly experience is turned into a livable, at times even almost enjoyable, one.
In this position paper, we advocate that, in the same spirit as Guido’s ingenious trick of turning a nazi camp into a sort of playground for his child, security should be beautiful; and if it isn’t so yet, it should then be made beautiful, so that the users experience it in that way. This is, of course, an extremely challenging objective, and we will discuss through further scenarios a few ways in which it could be made possible in the future. It turns out that the Peppa Pig cartoon may also be inspiring.
L. Viganò— Supported by the EU FP7 Project no. 257876, “SPaCIoS: Secure Provision and Consumption in the Internet of Services” (www.spacios.eu) and the PRIN 2010-11 project “Security Horizons”. This work began while Luca Viganò was at the Dipartimento di Informatica, Università di Verona, Italy.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Life is Beautiful (La vita è bella), Italy 1997, directed by Roberto Benigni, written by Roberto Benigni and Vincenzo Cerami.
References
Acquisti, A.: The Economics of Privacy. http://www.heinz.cmu.edu/~acquisti/economics-privacy.htm
Anderson, R.: Economics and Security Resource Page. http://www.cl.cam.ac.uk/~rja14/econsec.html
August, T., August, R., Shin, H.: Designing user incentives for cybersecurity. Commun. ACM 57(11), 43–46 (2014)
Blythe, J., Koppel, R., Smith, S.W.: Circumvention of security: good users do bad things. IEEE Secur. Priv. 11(5), 80–83 (2013)
Böhme, R. (ed.): The Economics of Information Security and Privacy. Springer, Heidelberg (2013)
Karlof, C., Tygar, J.D., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: SOUPS 2009: Proceedings of the 5th Symposium on Usable Privacy and Security. ACM Press (2009)
Lampson, B.: Usable security: how to get it. Commun. ACM 52(11), 25–27 (2009)
Payne, B.D., Edwards, W.K.: A brief introduction to usable security. IEEE Internet Comput. 12(3), 13–21 (2008)
Peppa Pig, Series 3, Episode 38, “The Secret Club” (2010)
Radke, K., Boyd, C., Gonzalez Nieto, J., Brereton, M.: Ceremony analysis: strengths and weaknesses. In: Camenisch, J., Fischer-Hübner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IFIP AICT, vol. 354, pp. 104–115. Springer, Heidelberg (2011)
Visualisation and Other Methods of Expression (2012). http://vome.org.uk/
Wash, R., Mackie-Mason, J.K.: Incentive-centered design for information security. In: HOTSEC 2006: Proceedings of the 1st Conference on USENIX Workshop on Hot Topics in Security. USENIX Association (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Bella, G., Viganò, L. (2015). Security is Beautiful. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-26096-9_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26095-2
Online ISBN: 978-3-319-26096-9
eBook Packages: Computer ScienceComputer Science (R0)