User help techniques for usable security
2007 (English)In: Proceedings of the 1st Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT’07) ACM Press, Boston, MA, USA, New York: ACM , 2007Chapter in book (Other academic)
There are a number of security-critical applications such as personal firewalls, web browsers and e-mail clients, whose users have little or no security knowledge and are easily confused, even frustrated by menus, messages or dialog boxes that deal with security issues.
While there are evaluations of existing applications and proposals for new approaches or design guidelines for usable security applications, little effort has been invested in determining how applications can help users in security decisions and security tasks. The purpose of this work is to analyse conventional and security-specific user help techniques with regard to their usefulness in supporting lay users in security applications.
We analyse the following help techniques: online documentation, context-sensitive help, wizards, assistants, safe staging and social navigation, and complement these with the tempting alternative of built-in, hidden security. Criteria for the analysis are derived from the type of user questions that can arise in applications and from definitions of when a security application can be called usable.
Designers of security applications can use our analysis as general recommendations for when and how to use and combine user help techniques in security applications, but they can also use the analysis as a template. They can instantiate the template for their specific application to arrive at a concrete analysis of which user help techniques are most suitable in their specific case.
Place, publisher, year, edition, pages
New York: ACM , 2007.
on-line help, safe staging, social navigation, usable security, user help, wizard
IdentifiersURN: urn:nbn:se:liu:diva-14433DOI: 10.1145/1234772.1234787ISBN: 1-59593-635-6OAI: oai:DiVA.org:liu-14433DiVA: diva2:23498
Article No. 112007-04-272007-04-272014-06-24Bibliographically approved