Title
An Experimental System for Studying the Tradeoff between Usability and Security
Abstract
An ideal system should be usable and secure. However, increasing the security of a system often makes its use more cumbersome and less efficient. This tradeoff between usability and security poses major challenges for system designers. System security may be impaired when users override or ignore security features to facilitate the use of the system. Little empirical data are available on user behavior regarding the tradeoff between security and usability. To obtain such data we developed a controlled research environment (i.e., a microworld) for studying userspsila tendency to take precautionary actions as a function of the tradeoff between a systempsilas usability and the level of security the system provides. It is a modified version of a ldquoTetrisrdquo game and includes an alert system that warns about possible virus attacks, which, if not prevented, can cause losses of monetary earnings. Users could alter the threshold settings of the security system. The system allows us to manipulate the usability cost of using a security feature, the severity of the consequences of an attack, the likelihood that a threat will occur, and the statistical properties of the security system. In a preliminary experiment two groups of 10 participants each used the system for three 20-minutes sessions. The likelihood for an attack was 4 times higher for one group than for the other group. The likelihood of an attack clearly affected participants' behavior. When attacks were more likely, participants altered thresholds more frequently, selected more cautious thresholds, and tended to respond more to security system alerts. This microworld is a step towards the development of quantitative predictive models of user interactions with security features while using a system.
Year
DOI
Venue
2009
10.1109/ARES.2009.174
Fukuoka
Keywords
Field
DocType
security of data,statistical analysis,microworld,statistical property,system security,system usability,Usability,alerts,experimental system,security,security settings
Security testing,Data security,Vulnerability (computing),Security through obscurity,Computer security,Computer science,Asset (computer security),Human-computer interaction in information security,Security information and event management,Countermeasure (computer)
Conference
ISBN
Citations 
PageRank 
978-0-7695-3564-7
3
0.46
References 
Authors
2
5
Name
Order
Citations
PageRank
Noam Ben-Asher110910.27
Joachim Meyer237641.28
Sebastian Möller3877141.17
Roman Englert417520.26
Ben-Asher, N.530.46