QUT ePrints

Security usability principles for vulnerability analysis and risk assessment

Josang, Audun, Al Fayyadh, Bander, Grandison, Tyrone, Alzomai, Mohammed, & McNamara, Judith (2007) Security usability principles for vulnerability analysis and risk assessment. In 23rd Annual Computer Security Application Conference, 10-14 December 2007, Miami Beach, Florida.

View at publisher

Abstract

Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engineering IT security solutions. When improving the usability of existing security applications, it is necessary to examine the underlying security technologies used to build them, and consider whether they need to be replaced by totally new security technologies that provide a better basis for good usability. This paper examines a set of security usability principles, proposes how they can be incorporated into the risk management process, and discusses the benefits of applying these principles and process to existing and future security solutions.

Impact and interest:

6 citations in Scopus
Search Google Scholar™
1 citations in Web of Science®

Citation countsare sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

426 since deposited on 09 Mar 2009
151 in the past twelve months

Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 18542
Item Type: Conference Paper
Keywords: Usability, Security
DOI: 10.1109/ACSAC.2007.14
ISSN: 1063-9527
Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > INFORMATION SYSTEMS (080600) > Computer-Human Interaction (080602)
Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
Divisions: Current > QUT Faculties and Divisions > Faculty of Law
Past > QUT Faculties & Divisions > Faculty of Science and Technology
Past > Institutes > Information Security Institute
Copyright Owner: Copyright 2007 IEEE Computer Society
Copyright Statement: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Deposited On: 10 Mar 2009 08:52
Last Modified: 29 Feb 2012 23:49

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page