Jump to content

Usable security

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Losipov (talk | contribs) at 04:51, 23 July 2023 (Declining submission: The "Scientific conferences" section doesn't cite any sources, so that should be addressed. Overall, more sources and content are needed to establish notability. (AFCH 0.9.1)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

  • Comment: Note that the article's title should be in sentence case per MOS:AT ("Usable security"). —DocWatson42 (talk) 02:41, 7 December 2022 (UTC) (Just passing through.)
  • Comment: I'd suggest removing the "common goals" section as that's not very encyclopedic. ― Blaze WolfTalkBlaze Wolf#6545 15:57, 5 December 2022 (UTC)

Usable security is a subfield of computer science, human-computer interaction and cybersecurity concerned with the user interface design of cybersecurity systems.[1] In particular, usable security focuses on ensuring that the security implications of interacting with computer systems, such as via alert dialog boxes, are accessible and understandable to human users. This differs from the software engineering method of secure by design by placing greater focus on the human aspects of cybersecurity rather than the technical. Usable security also sits opposite the idea of security through obscurity by instead working to ensure that users are aware of the security implications of their decisions.[2][3]

Scientific conferences

  • EuroUSEC: European Symposium on Usable Security
  • HAS: International Conference on Human Aspects of Information Security, Privacy, and Trust
  • IFIP World Conference on Information Security Education
  • STAST: International Workshop on Socio-Technical Aspects in Security
  • TrustBus: International Conference on Trust and Privacy in Digital Business
  • USEC: Usable Security and Privacy Symposium

See also

References

  1. ^ Garfinkel, Simson; Lipford, Heather Richter (2014), "Introduction", Usable Security, Cham: Springer International Publishing, pp. 1–11, doi:10.1007/978-3-031-02343-9_1, ISBN 978-3-031-01215-0, retrieved 2022-12-01
  2. ^ Renaud, Karen; Volkamer, Melanie; Renkema-Padmos, Arne (2014), De Cristofaro, Emiliano; Murdoch, Steven J. (eds.), "Why Doesn't Jane Protect Her Privacy?", Privacy Enhancing Technologies, vol. 8555, Cham: Springer International Publishing, pp. 244–262, doi:10.1007/978-3-319-08506-7_13, ISBN 978-3-319-08505-0, S2CID 9509269, retrieved 2022-12-01
  3. ^ Yee, Ka-Ping (2004). "Aligning security and usability". IEEE Security & Privacy. 2 (5): 48–55. doi:10.1109/MSP.2004.64. ISSN 1558-4046.