Designing user studies for security applications: a case study with wireless network configuration

  • Authors:
  • Cynthia Kuo;Adrian Perrig;Jesse Walker

  • Affiliations:
  • Nokia Research Center, Palo Alto, CA, USA.;Carnegie Mellon University, Electrical and Computer Engineering, and Engineering and Public Policy, and Computer Science Departments, Pittsburgh, PA, USA.;Intel Corporation, Corporate Technology Group, Hillsboro, OR, USA

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Spontaneous interactions between end users and devices are generally secured by human actions. Evaluating whether end users are able to perform these actions correctly can be challenging. Basic, textbook-style user study methods make assumptions that may not hold for security applications. In this piece, we outline five major user study assumptions. Using 802.11 network configuration as a case study, we also show how to adapt existing user study methods for evaluating security applications. We model how security experts might approach the configuration of their own home networks. Next, we combine several methods to design a study that pinpoints where end users encounter difficulties during configuration. Finally, we discuss the findings from our user study.